Network technician for a mid-size company.

 

 

Assume you are a network technician for a mid-size company. You’re often at the office on Saturday afternoons to catch up on work without disruption. You get a phone call from a person who identifies himself as the new assistant to a company vice president. He says the VP is traveling internationally and needs access to certain sensitive files on the server but cannot access it.The assistant needs the VP’s network credentials to locate the files, and he is worried he will be fired if he doesn’t get the information quickly. You’ve never spoken directly to the VP and are not familiar with the assistant.Answer the following question(s):1. You are not sure if this is a legitimate request or a social engineering scam. What is the best way to handle this situation?

The post Network technician for a mid-size company. first appeared on COMPLIANT PAPERS.