Microsoft Office 365 and the human side of cyber attacks

“Hi, this is Kevin from IT. We've been notified of a virus on your department’s machines.”

Add some authentic hold music, and a social-engineering attacker can trick employees into sharing company info, like passwords.

Learn how to use technology and prevention strategies to guard against dumpster diving, spear phishing, and other tactics with:

  • Real-world prevention strategies
  • Tools to spot suspicious actions
  • Real-time behavioral malware analysis

Download Insider’s Guide to Social Engineering

Autofill this form by signing into your social network: