However much technology you throw at protecting your organization's systems the weakest link is still the person sitting in front of the endpoint. No surprise then that social engineering is increasingly the attacker's weapon of choice for gaining access to sensitive systems. Security rating and risk monitoring company SecurityScorecard has put together an infographic showing the five most common attacks and their impact on enterprises. The attacks identified are 'pretexting' -- assuming another identity to obtain sensitive information, 'tailgating' -- following a person with legitimate access into a secure location, 'quid pro quo' -- offering some incentive in exchange for… [Continue Reading]