Your ultimate guide to social engineering

By CSO staff, CSO |  Security, insider, social engineering

Social engineering attacks security at its weakest link: People. Preying on employees' best intentions, social engineers gain unauthorized access to systems and information.

So how do you secure people against these tactics? Storytelling, education, processes, and other methods all come into play. CSO's Ultimate Guide to Social Engineering, gathered from CSO's popular interviews with social engineering experts, provides a complete look at common techniques in both attack and defense.

This 13-page pdf is available for download by registered CSO Insiders only.

What's in the Ultimate Guide:

Social engineering defined

How social engineers work and the psychology they rely on

Awareness and prevention techniques

Lots of examples of social engineering in action

To become a CSO Insider, follow the instructions below. When you have registered (or signed in), you will be returned to this page with directions on downloading the Ultimate Guide. You will also have access to all CSO Insider material including other Ultimate Guides and much more.

To continue reading, register here to become an Insider. You'll get free access to premium content from CIO, Computerworld, CSO, InfoWorld, and Network World. See more Insider content or sign in.


Originally published on CSO |  Click here to read the original story.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

SecurityWhite Papers & Webcasts

See more White Papers | Webcasts

Answers - Powered by ITworld

ITworld Answers helps you solve problems and share expertise. Ask a question or take a crack at answering the new questions below.

Ask a Question
randomness