When conducting reconnaissance of your cyber infrastructure, attackers look for weaknesses they can utilize to successfully penetrate your infrastructure with the least expenditure of resources and risk of being detected. The vulnerabilities created by human action or inaction have always been a potential attack vector. The increased focus on adding technical controls to bolster cyber defenses means that an organization’s workforce is now the preferred one. Attackers exploit this potential human vulnerability through social engineering.
Social engineering provides an attacker with a better return on investment than many other techniques at their disposal. Why would an . . .