An attacker could pose as a company employee, invite customers or partners to meetings, then use socially engineered conversation to extract sensitive information.
Go to Source
Author: Tara Seals
Cyber Security Expert
Go to Source
Author: Tara Seals