This resource is no longer available
In today’s threat landscape, social engineering attacks take advantage of people’s trust, fear or inattention and they don’t usually require highly specific technical skills on the side of the attacker.
Luckily, this social engineering handbook outlines:
- 7 types of social engineering techniques
- How to know when an attacker is posing as the CEO, or impersonating someone else “trustworthy”
- How to address extortion scams
- And more
Access now to learn how you can take the right action when you face a social engineering attack.