DEV Community

Discussion on: Protect Yourself from Social Engineering

Collapse
 
crimsonmed profile image
Médéric Burlet

Loved this post, congratulations! However I think there is maybe a small paragraph missing about in person social engineering. Many companies have been compromised in the past by having a hacker simply pose as a janitor and access a terminal in the company or simply see the logins written on post-it notes on the screen.

Collapse
 
ctrlshifti profile image
Kat Maddox

Good point! Thanks for the comment. May update the article later to write a bit on that.

Collapse
 
crimsonmed profile image
Médéric Burlet

Looking forward to it! Keep up the good work I need to find the time to write more articles on security as well.