Security & Social Engineering

One of the weakest  links in it security are the users. This is very important as in a company, managers and employees are the first that can compromise your network.

Bad surfing habits, using the network resources in unwanted and unaccepted ways are some of the issues that a network administrator can handle. Unfortunately social engineering is not one of the issues that can be addressed  directly.

This article is to give an overview of this issue to the people that are supposed to cover the overall network security of a company:

Also Social Engineering event targets as Google,Apple and Microsoft with fun results:


About Alexandru

Hi, I am Alexandru currently in Denmark studying at Lillebaelt at Networking as an Erasmus studend.
This entry was posted in IT Security, Week 14. Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s