Social engineering — users are the weakest link
Social engineering in the IT context is...


What is NOT considered sensitive data?


Locating sensitive and important data in one place is a good idea.


Raising awareness about technical engineering is crucial


Phishing, the most popular social engineering technique, is...


Vishing is a variation of phishing done using voice technology


Most social engineering attacks are based on 5 principles..