When an attacker fails with one person, they often go to another person. The key is to report the attack to other departments. Workers should know to act like they are going along with what the hacker wants and take copious notes so the company will know what the hacker is trying to find.
Kevin MitnickWe have problems with our physical security, operational security through to management.
Kevin MitnickMy actions constituted pure hacking that resulted in relatively trivial expenses for the companies involved, despite the government's false claims.
Kevin MitnickWhen an attacker fails with one person, they often go to another person. The key is to report the attack to other departments. Workers should know to act like they are going along with what the hacker wants and take copious notes so the company will know what the hacker is trying to find.
Kevin Mitnick