February 28, 2012, 1:10 PM — Social engineering attacks security at its weakest link: People. Preying on employees' best intentions, social engineers gain unauthorized access to systems and information.
So how do you secure people against these tactics? Storytelling, education, processes, and other methods all come into play. CSO's Ultimate Guide to Social Engineering, gathered from CSO's popular interviews with social engineering experts, provides a complete look at common techniques in both attack and defense.
This 13-page pdf is available for download by registered CSO Insiders only.
What's in the Ultimate Guide:
Social engineering defined
How social engineers work and the psychology they rely on
Awareness and prevention techniques
Lots of examples of social engineering in action
To become a CSO Insider, follow the instructions below. When you have registered (or signed in), you will be returned to this page with directions on downloading the Ultimate Guide. You will also have access to all CSO Insider material including other Ultimate Guides and much more.