This initial chapter in the defensive strategies section will look at how the reader can harden their policies and procedures as a way of protecting against a possible social engineering attack. Various methods and recommendations will be provided to assist the reader to identify policy weaknesses and make the required changes to avert a potential issue.
Outer layer protection; inner layer protection; industry information security; cyber security standards; social engineering policies and procedures; password guidance
Information in this chapter
• Outer layer protection
• Inner layer protection
• Social engineering defense: ...