Social engineering — users are the weakest link
Social engineering in the IT context is...

What is NOT considered sensitive data?

Locating sensitive and important data in one place is a good idea.

Raising awareness about technical engineering is crucial

Phishing, the most popular social engineering technique, is...

Vishing is a variation of phishing done using voice technology

Most social engineering attacks are based on 5 principles..