This document discusses security breaches and social engineering attacks. It explains that security breaches often happen because individuals seek to steal corporate or private information for financial or competitive gain. It then describes how social engineering attacks work, including dumpster diving and posing as employees or consultants to trick people into providing access or information. An example is given of reverse social engineering where an attacker causes a problem and then fixes it in order to establish trust and get login credentials. The document concludes by discussing technical and social vulnerabilities and measures companies can take to prevent security breaches like developing comprehensive security policies, conducting audits and training.