When considering the disposal of confidential data, equipment and storage devices, what social engineering technique SHOULD always be taken into consideration?
I think it might be Dumpster Diving since it involves searching through discarded items for sensitive information. That sounds familiar from our practice questions.
Justa
4 months agoCecily
4 months agoMarget
4 months agoParis
5 months agoAllene
5 months agoJaime
5 months agoCarey
5 months agoMeaghan
5 months agoAimee
5 months agoFatima
5 months agoAngelica
5 months agoWerner
5 months ago