Combating Social Engineering: Recommended Practices
Your data sits behind a modern solution that requires a login, password, and MFA. And all someone has to do to sidestep all that is convince a support representative that they’re you. This article describes things you can do to add a little more defense.