The weakest link is always the user. Not only your "standard" user, but also IT staff. By better understanding the "art" of social engineering, you'll get a better understanding of the types of attacks and methods attackers are using to gain access to your network or worse yet, hold your data for a ransom. This session will cover the four primary emotions attackers use to gain users trust, which eventually leads to the attacker gaining access to your resources.
You will learn:
- Why social engineering works
- About the various methods that attackers are using to social engineer your users
- How to protect yourself and teach your users to protect themselves from this attack vector