Skip to main content
  • Login
  • Subscribe
  • home
  • news
    • Daily News
    • Press Releases
    • Events
  • features
    • Expert Opinions
      • Executive Interviews
      • Opinion/byline
    • Analyst Comments
      • Executive Interviews
      • Opinion/byline
    • Videos
      • Executive Interviews
      • Product launches/Event coverage
      • Webinars
      • Video Tutorials
    • Blogs
  • taxonomy
    • cloud storage
    • storage and virtualization
    • Network storage
    • Data backup
    • Data Protection
    • Data storage management
    • Storage strategy
    • Big Data
  • research
    • Learning Guides
    • White Papers
    • Case Studies
    • Vendor Pages
  • community
    • Discussion groups

Advertisement Here

Advertisement

Looking for something else?

Search form

Home » Research »Learning Guides

The Social Engineering Threat

DSA Editorial
Oct 29, 2019
0
Keywords:
The Social Engineering Threat
Data Protection

Cyber criminals today get upclose and personal with potential victims. They are normally familiar with victims; knowing where they work, their lifestyle and what they do. These information is then used to create and target personalised attacks on the victims. 

Download this infographic to learn more about social engineering threats. 

You might also like
  • Infographic: IBM Spectrum Protect...
  • Executive Briefing Note: Hybrid...
  • Infographic: Challenges that May...
  • e-Book: Securing a New Digital...
  • Infographic: A step by step Approach...
Most comment
  • DSA EasyTech Guide to NAS in the Home supported by QNAP
  • A Single Data Protection Strategy supported by Arcserve
  • DSA Guide to planned and affordable Data Recovery supported by Kroll Ontrack
  • DSA Spotlight on Dell Software Defined Storage
  • Flash in a Flash interview series compilation supported by Solidfire
  • DSA Executive Guide to Hadoop Supported by Cloudera
  • Why Ransomware Could Cripple Your Business
  • Technology Explained Software Defined Storage
  • DSA Executive Guide to Cloud Continuity supported by Zerto
  • DSA Spotlight to Alibaba Cloud Security Capability
share us your thought

0 Comment Log in or register to post comments

Tweet
Advertisement

Advertisement Here

Advertisement

  • Home
  • News
  • Features
  • Research
  • Bloggers
  • Big Data
  • Cloud Storage
  • Storage And Virtualization
  • Network Storage
  • Data Backup
  • Data Protection
  • Data Storage Management

  • Storage Strategy
  • Privacy
Copyright © 2021 Asia Online Publishing Group Sdn. Bhd. Reproduction in whole or in part is prohibited. Please send any technical comments or questions to our webmaster.