Social Engineering Policy: Identity Verification

Being aware of how attackers use pretexting to gather information, you need to write a policy describing the procedures our fictitious company will use to verify the identity of those requesting information. Part A: Using ONLY your readings for this week as well as the videos and supplemental reading on how attackers use pretexting to … Read more