The following are resources that can be used to gain more knowledge of the subjects covered in this chapter:
- The Evolution of Phishing: https://www.tripwire.com/state-of-security/featured/evolution-phishing/
- Social Engineering: an IT Security problem doomed to get worse: https://medium.com/our-insights/social-engineering-an-it-security-problem-doomed-to-get-worst-c9429ccf3330
- Cost of a Data Breach Study: https://www.ibm.com/security/data-breach
- The Evolution of Cyber Threat and Defence: https://www.infosecurityeurope.com/__novadocuments/96072?v=635742858995000000
- What's Lurking Back There: Cybersecurity Risks in Legacy Systems: https://businesslawtoday.org/2018/03/whats-lurking-back-there-cybersecurity-risks-in-legacy-systems/
- Legacy cybersecurity products failed to protect 97% of organizations: https://www.helpnetsecurity.com/2014/05/21/legacy-cybersecurity...