How do attacker attack? We look at their tactics and explore your options to help recognise and evade them. We examine social engineering in a cyber security and physical context, as well as technical exploits.
(Full Show Notes available on our website.)