The Anatomy of a Social Engineering Attack

The Anatomy of a Social Engineering Attack

15 Feb 2019

A good attacker doesn’t need to know how to get through your firewall, if they’re able to walk straight into your server room.

When we talk about data breaches, the buzzword ‘cyber’ usually springs to mind, and while this isn’t wrong, it also isn’t the only thing you should be thinking about. Security isn’t just about one thing and relying on technology alone isn’t enough to keep your data secure.

In this white paper, we explore:

  • What social engineering involves and how it works;
  • Research and tactics used by attackers;
  • Example scenarios based on our experience of performing social engineering engagements; and
  • Recommendations on how to prevent this happening to your organisation

Dieses Whitepaper herunterladen

CBEST
CREST STAR
CHECK IT Health Check Service
CREST
Cyber Essentials
CESG Certified Service
First - Improving Security Together
BSI ISO 9001 FS 581360
BSI ISO 27001 IS 553326
Allianz für Cyber-Sicherheit