Methods of Social Engineering

Methods of Social Engineering

Nov 2, 2022

What are some of the methods phishers use to compromise organizations?

In this video, Nick goes over the common methods phishers use to gain information:

  • Email
  • Text Messages
  • Phone Calls

Phishing is most insidious when it uses a combination of techniques. It can even overcome sophisticated security measures like Multifactor Authentication (MFA) – for example, if an attacker manages to steal a password through email, then calls the user pretending to be a technician asking them to approve an authenticator popup on their phone.

Can Sedara help you with assessing or improving your organization's cybersecurity stance? Contact us for more information.