Link
A Microsoft white paper detailing guidelines for protecting your corporate assets from social engineers and properly training staff on the matter.
This blog will be used to document the progress of my Security and Risk Analysis 111 Honors Option for Penn State's Schreyer Honors College. The final deliverable will be a research paper analyzing and contrasting the risk associated with weaknesses in information policy and the weaknesses in information technology.