THDP8 – Social Engineering 101

Social Engineer…good security takes into account the least common denominator…….the human being.  Yes, even the human being who may be in charge of enforcing those very security tenets.

I don’t remember who said this but the biggest truth in this discussion is that the best security policy is only as good as its people staffing it.

Show Links:


References used for this Podcast/Blog:

Social Engineering:  The Basics, by:  Joan Goodchild, CSO Online, December 20, 2012,

What is Social Engineering, by:  Linda Criddle, Webroot,

The biggest malware, security threats in 2013, by: Charlie Osborne, Zero Day, December 5, 2013,

Top 5 Social Engineering Exploit Techniques, by: Jamey Heary, Network World, November 14, 2009,

Study: People open email even if its suspicious, by: Dave Johnson, Moneywatch, September 12, 2013,

Cyber Security: 75% of Data Breaches are Inside Jobs, by: the Daily Staff Writer, the Information, September 27, 2012,

Social Engineering: 5 Security Holes at the Office (Includes Video), by: Joan Goodchild, CSO Security and Risk, June 8, 2009,

Why cybercriminals want your personal data, by: Joe Ross, Help Net Security, November 12, 2013,

Computer Based Social Engineering Tools:  Social Engineer Toolkit (SET), Social,

Leave a Reply

Your email address will not be published. Required fields are marked *