Demonstrating one of the most common methods hackers use to get into company networks and what to look out for. Full version coming soon.

source