- Security TWENTY Home
- Women in Security
New from CPNI is a guide for business and security managers to help identify the threat from those who wish to extract information from employees or gain access to sites using psychological manipulation.
For the 21-page guide visit the CPNI website.
As individuals and organisations improve their physical and electronic defences, those wishing to gain access to premises or acquire sensitive information may attempt to exploit people within the organisation who already have legitimate access. Social engineering is the process whereby a third party can gain that information or access.
There are various methods a social engineer may employ such as inducing someone to open an email through a false incentive or establishing a relationship with an individual, which can be exploited at a later date.
This guide is for business and security managers as a means to identify the different types of threat from social engineers and implement appropriate counter measures to minimise the risk.