Archives - Social Engineering

Practice social engineering awareness

Recognize the significance of social engineering awareness in safeguarding against modern cyber threats. Cybercriminals frequently employ manipulation tactics to exploit human psychology and gain unauthorized access to systems and data. Elevate your online and offline awareness, educating yourself and your team on common social engineering tactics, including pretexting, baiting and tailgating. By cultivating a culture […]

So, what’s social engineering all about?

Basically, it’s when an attacker uses their people skills to get info on a company or its computer systems. Attackers might pretend to be a new employee, repairman, or researcher – they might even dish out fake credentials to back up their story. By asking a few questions, they can collect info that gives them […]

Never respond to requests for money

A common scheme on social media and dating sites is to connect with someone online, trick them into thinking the relationship is legitimate, and then attempt to steal money from the victim. This can come in many forms, but often the cybercriminal will make up a story like they’re stuck in another country and can’t […]

Don’t meet up with anyone online without getting to know them better first

Online dating may be here to stay, but with it comes the risk of criminals trying to take advantage of you by claiming to be someone they’re not. If you engage in online dating, be sure you have a good idea who they are before meeting up with them, and always meet in a public […]

Be suspicious of strange messages, even if they’re from people you know

If you receive a message from someone you haven’t heard from in a long time or the communication is in any way unusual, make sure the person you’re talking to isn’t a hacked account by asking them if the message is legitimate through another means such as calling or texting them.

Be aware of social engineering attacks

In a social engineering attack, an attacker uses human interaction (social skills) to obtain or compromise information about an individual or organization computer system. An attacker may seem unassuming and respectable, possibly claiming to be a new employee, repair person, or researcher and even offering credentials to support that identity. However, by asking questions, he […]