Social engineering: The threat and the solution

9

Author: JT Smith

syslog writes “Ever wonder how big companies and big government spend millions on
internal and external security (firewalls, security personnel,
intrusion detection systems, etc.) and are still compromised? One crucial piece is missing — an audit of how successful the
policies and procedures are being implemented. Enter social
engineering. Check out the entire story here.

Category:

  • Linux