Methods of Social Engineering
What are some of the methods phishers use to compromise organizations?
In this video, Nick goes over the common methods phishers use to gain information:
- Text Messages
- Phone Calls
Phishing is most insidious when it uses a combination of techniques. It can even overcome sophisticated security measures like Multifactor Authentication (MFA) – for example, if an attacker manages to steal a password through email, then calls the user pretending to be a technician asking them to approve an authenticator popup on their phone.
Can Sedara help you with assessing or improving your organization's cybersecurity stance? Contact us for more information.