Social Engineering: Using People to Breach Network Security


Download

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.

According to Info-Tech Research Group data, IT managers spent close to $61 billion on IT security annually. Between $21 and $27 billion dollars of that is attributed to the acquisition of new security technology. The same study showed that security spending has been growing as a percentage of IT budgets. Is all this spending making IT security safer?

The truth is that security infrastructure is only as good as its weakest link. No matter how sophisticated or expensive a security infrastructure is, access to the system can readily be gained by manipulating people through social engineering.

Related Content

GET HELP Contact Us
×
VL Methodology