> Research Library > Rapid7 > How to Design an Effective Program to Protect Your Organization Against Social Engineering
 

How to Design an Effective Program to Protect Your Organization Against Social Engineering

White Paper Published By: Rapid7
Rapid7
Published:  Apr 04, 2013
Type:  White Paper
Length:  12 pages

It seems like we’ve been hearing a lot about phishing in the news in recent years, and this threat hasn’t abated yet. Why are attacks via phishing –and social engineering in general —so prevalent and so effective?  This whitepaper examines the many different methods employed in phishing attacks and social engineering campaigns, and offers a solution-based approach to mitigating risk from these attack vectors.



Tags : 
rapid7, protect organization, attacks via phishing, solution based approach, mitigating risks

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee