1. Checkpoint. (2018). 2018 security report: Welcome to the future of cyber security. Check Point Research. San Carlos, CA: Check Point Software Technologies Limited. https://www.checkpoint.com/downloads/product-related/report/2018-security-report.pdf
2. European Union Agency for Network and Information Security (ENISA). (2018). ENISA threat landscape report 2017: 15 top cyber-threats and trends. Heraklion: ENISA. https://doi.org/10.2824/967192
3. Hadnagy, C. (2010). Social engineering: The art of human hacking. Indianapolis, IN: John Wiley & Sons.
4. IBM Security Services. (2014). IBM security services 2014 cyber security intelligence index: Analysis of cyber-attack and incident data from IBM's worldwide security operations (Report No. SE303058-USEN-02). Somers, NY: IBM Corporation.
5. Tierney, S. (2018, January 8). Protect yourself against the top 3 cyber threats of 2018. Microsoft Industry Blogs -- United Kingdom. https://cloudblogs.microsoft.com/industry-blog/en-gb/industry/financial-services/protect-yourself-against-the-top-3-cyber-threats-of-2018/