Combating Social ENGINEERING

Emails, telephone calls, in-person conversations all things we do daily and seemingly harmless. But are they? Social engineers will use these encounters to manipulate your people into divulging confidential information and perform actions that are harmful to your organization. The phone call from “Scott in IT” who tells your secretary he’s working on a tight deadline and needs her IP address or the password to her account. Or the friendly gentleman with a charming smile who says he forgot his ID badge and asks you to let him in. The weakest link in your security plan will often be someone in your organization. In most cases people don’t know they are being socially engineered; with training, they will. Give your organization the tools to avoid such an intrusion. Contact us today.

THE SIX SECURITY

CONACT NOW

CONTACT NOW