Social Engineering: Understanding How Attackers Exploit Users
Explore how malicious actors use social engineering tactics to compromise users and the importance of awareness in cybersecurity. Refer to IBM Security QRadar EDR and Threat Intelligence Report '23 for insights.

IBM Technology
88.4K views • Jun 2, 2023

About this video
IBM Security QRadar EDR: https://ibm.biz/BdPNdF
Threat Intelligence Report '23: https://ibm.biz/BdPNdR
Humans are the weakest link in any security system. So why would a bad guy try to hack into a complex system when they can go after the weakest link - you? Watch how Jeff Crume, IBM Distinguished Engineer, describes the many methods that these bad guy/hackers use that you should know about so you can protect yourself.
Get started for free on IBM Cloud → https://ibm.biz/ibm-cloud-sign-up
Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now
#AI #Software #ITModernization #hackers #JeffCrume #socialengineering
Threat Intelligence Report '23: https://ibm.biz/BdPNdR
Humans are the weakest link in any security system. So why would a bad guy try to hack into a complex system when they can go after the weakest link - you? Watch how Jeff Crume, IBM Distinguished Engineer, describes the many methods that these bad guy/hackers use that you should know about so you can protect yourself.
Get started for free on IBM Cloud → https://ibm.biz/ibm-cloud-sign-up
Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now
#AI #Software #ITModernization #hackers #JeffCrume #socialengineering
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
88.4K
Likes
2.3K
Duration
14:58
Published
Jun 2, 2023
User Reviews
4.7
(17) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.
Trending Now