Training

Guide to thwart social engineering

by Mark Rowe

New from CPNI is a guide for business and security managers to help identify the threat from those who wish to extract information from employees or gain access to sites using psychological manipulation.

For the 21-page guide visit the CPNI website.

As individuals and organisations improve their physical and electronic defences, those wishing to gain access to premises or acquire sensitive information may attempt to exploit people within the organisation who already have legitimate access. Social engineering is the process whereby a third party can gain that information or access.
There are various methods a social engineer may employ such as inducing someone to open an email through a false incentive or establishing a relationship with an individual, which can be exploited at a later date.

This guide is for business and security managers as a means to identify the different types of threat from social engineers and implement appropriate counter measures to minimise the risk.

Related News

  • Training

    Scots fraud facts

    by Mark Rowe

    New from the Fraud Advisory Panel, a fact sheet on Scotland – to inform fraud practitioners, lawyers and others of the legal…

  • Training

    Emergency Services Show

    by Mark Rowe

    Counter-terrorism is among issues at the annual Emergency Services Show which returns to Hall 5 at the NEC, Birmingham on September 20…

  • Training

    Threat intelligence report

    by Mark Rowe

    An information security consultancy, MWR InfoSecurity, has released a CPNI and CERT-UK supported study titled Threat Intelligence: Collecting, Analysing, Evaluating. The infosec…

Newsletter

Subscribe to our weekly newsletter to stay on top of security news and events.

© 2024 Professional Security Magazine. All rights reserved.

Website by MSEC Marketing