The techniques listed below gauge the education of security awareness of the staff and the vulnerabilities from the lack of security education. These techniques may include pretext phone calls and site visits— such as posing as vendors, employees, IT support personnel, clients, etc. icon-1 Reconnaissance... Continue reading