O'Reilly logo

Low Tech Hacking by Sean Lowther, Russ Rogers, Jennifer Jabbusch, Terry Gudaitis, Jack Wiles

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8. Information security awareness training
Your most valuable countermeasure to employee risk
Information in this chapter
• An Introduction to Information Security Awareness
• Designing an Effective Information Security Awareness Program
• Implementing an Information Security Awareness Program
• Making Security Part of the Company Mindset
• Measuring Your Program's Success
As the previous chapters stated, social engineering attacks are a very real security threat that individuals as well as companies of all sizes must contend with on a daily basis. One way a company can minimize the risk of falling victim to such an attack is to design and implement an effective Information Security Awareness Program. This chapter explains why such a program ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required