We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
80,258 News Articles

CSO's Ultimate Guide to Social Engineering

Social engineering attacks security at its weakest link: People. Preying on employees' best intentions, social engineers gain unauthorized access to systems and information.

So how do you secure people against these tactics? Storytelling, education, processes, and other methods all come into play. CSO's Ultimate Guide to Social Engineering, gathered from CSO's popular interviews with social engineering experts, provides a complete look at common techniques in both attack and defense.

This 13-page pdf is available for download by registered CSO Insiders only.

What's in the Ultimate Guide:

Social engineering defined

How social engineers work and the psychology they rely on

Awareness and prevention techniques

Lots of examples of social engineering in action

To become a CSO Insider, follow the instructions below. When you have registered (or signed in), you will be returned to this page with directions on downloading the Ultimate Guide. You will also have access to all CSO Insider material including other Ultimate Guides and much more.

To continue reading, register here to become an Insider. You'll get free access to premium content from CIO, Computerworld, CSO, InfoWorld, and Network World. See more Insider content or sign in.


IDG UK Sites

Acer Aspire R11 review: Hands-on with the 360 laptop and tablet convertible

IDG UK Sites

Apple Watch release day: Twitter reacts

IDG UK Sites

See how Framestore created a shape-shifting, oil and metal based creature for Shell

IDG UK Sites

Apple Watch buying guide, price list & where to buy today: Which Apple Watch model, size, material,?......