. >> the phishing emails, click here to enter these sweepstakes? >> some of them are not as cheesy and obvious as those. ame of them, the good ones do well-crafted e-mail. say theyreason, let's knew we were meeting today. they might send an e-mail, thanks for coming today, i thought you would find this article interesting. they can make things believable by knowing you would have a conference at a certain time or something like this, but as soon as you open the pdf document or whatever it is, you are infected, and many times don't even know about it. >> a lot of it is technology. but also social engineering. >> absolutely. almost all the advanced attacks start with the exportation of a person i. a really simple attack, tricking someone to click on something. >> are the regulations of the federal level that apply to all this? >> there are standards and regulations for how we protect systems. many of them, depending on processing payments, a set there, storing government and classify data, another set of standards. there's increasing discussion on wh