One of the most important parts of avoiding compromise is understanding how cybercriminals may attempt to gain access to your critical data, reveals Renee Tarun, VP of Information Security at Fortinet. He goes on to say that attack techniques continue to evolve and become more sophisticated, giving cybercriminals a vast toolkit to use to exploit users. Here are seven techniques to look out for: Social engineering attacks: Attacks such as phishing through emails and texts, where users are tricked into providing their credentials, clicking on malicious links or attachments, or going to malicious websites. Dictionary attacks: Attacker uses a list of common words, called the dictionary to try to gain access to passwords in anticipation that people have used common words or short pass...