Social Engineering: Understanding How Attackers Exploit Users

Explore how malicious actors use social engineering tactics to compromise users and the importance of awareness in cybersecurity. Refer to IBM Security QRadar EDR and Threat Intelligence Report '23 for insights.

Social Engineering: Understanding How Attackers Exploit Users
IBM Technology
88.4K views • Jun 2, 2023
Social Engineering: Understanding How Attackers Exploit Users

About this video

IBM Security QRadar EDR: https://ibm.biz/BdPNdF

Threat Intelligence Report '23: https://ibm.biz/BdPNdR

Humans are the weakest link in any security system. So why would a bad guy try to hack into a complex system when they can go after the weakest link - you? Watch how Jeff Crume, IBM Distinguished Engineer, describes the many methods that these bad guy/hackers use that you should know about so you can protect yourself.

Get started for free on IBM Cloud → https://ibm.biz/ibm-cloud-sign-up
Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now
#AI #Software #ITModernization #hackers #JeffCrume #socialengineering

Tags and Topics

Browse our collection to discover more content in these categories.

Video Information

Views

88.4K

Likes

2.3K

Duration

14:58

Published

Jun 2, 2023

User Reviews

4.7
(17)
Rate:

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.