The challenge of detecting a targeted attack is that it can come from anywhere. Verizon’s 2010 Data Breach Investigation Report: 87 percent of victims “had evidence of the breach in their log files, yet missed it” Detecting attacks attempting to exploit human assets is often nearly impossible without regular training and awareness. Logging needs to be enabled, monitoring of those logs needs to take place so that early detection can occur, says John Defterios. To detect a socially engineered attack requires both technical controls and user awareness and training.”]

