Discussion: Social engineering attack
Most organizations know that they are targets but still don't address the problems until it is too late method and discuss how you believe an organization can and SHOULD be more proactive in handling a security risk to protect data.
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.