Please note that the content on this page is retired. This content is not maintained and may contain information or links that are out of date.

The main goal of technology-based social engineering is to obtain confidential information from individuals within an organization for the purpose of gaining access to the enterprise's network. Attackers either deceive individuals into divulging access information or they obtain information left on discarded company documents and/or storage devices (hard drives, storage media, etc.). This note provides an overview of the most common types of technology-based deception and recommends a series of protections to mitigate those threats.

Related Content


Get Access

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.