From the Fall 2015 Issue

Social Engineering: The Root of the Cyber Threat

Douglas Rausch
President | Aurora CyberSecurity Consultants, Inc.

R. “Montana” Williams
Founder and Managing Partner | Titan Rain Cybersecurity, LLC

When conducting reconnaissance of your cyber infrastructure, attackers look for weaknesses they can utilize to successfully penetrate your infrastructure with the least expenditure of resources and risk of being detected. The vulnerabilities created by human action or inaction have always been a potential attack vector. The increased focus on adding technical controls to bolster cyber defenses means that an organization’s workforce is now the preferred one. Attackers exploit this potential human vulnerability through social engineering.

Social engineering provides an attacker with a better return on investment than many other techniques at their disposal. Why would an . . .

Leave a Comment