Breached?

Report an incident

Question?

Contact us now

Protect

Download

Social Engineering Overview

Effective scenario-based training must use the same methodologies employed by a hostile attacker. Physical intrusion into the premises with remote social engineering attacks like spear phishing email and USB keys left on-site. “Obvious” attacks to distract from more stealthy attacks, and when compromise is achieved, employ stealth and other activities to remain on the network.

Related Articles:

Speak to a cyber security expert.

Contact us for more information and to see how we can provide you with a solution to meet your needs.