Vulnerable to a technique called “social engineering.”

vulnerable to a technique called “social engineering.” Carefully worded emails and pop-ups can trick us into sharing information we should not otherwise be distributing. Consider the following:
• What are some common methods of social engineering?
• What recent high-profile security incidents involved social engineering?
• Have you or anyone you known fallen prey to social engineering?
• What are some high-profile incidents of social engineering leading to data disclosures?
• What strategies should you take as an enterprise architect to address this? How would you handle disclosure of a security incident?
Response Parameters