O'Reilly logo

Social Engineering Penetration Testing by Richard Ackroyd, Andrew Mason, Gavin Watson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 2

The Weak Link in the Business Security Chain

Gavin Watson,    Senior Security Engineer, RandomStorm Limited

It is still very much the case that companies will invest more money in defense technology than developing personnel awareness training and hardened policies and procedures. This chapter will explain why this approach is taken, why it isn’t effective, and clearly paint a picture of just how vulnerable companies actually are.

Keywords

Data classification; customer service mentality; weak awareness and training; weak policies; weak procedures; the weakest link

Information in this chapter

• Why personnel are the weakest link

• Secure data with vulnerable users

• The problem with privileges

• Data classifications and need to know

• Security, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required