0% found this document useful (0 votes)
134 views1 page

Knowledge Is Your Best Defense.: Cybercriminals YOU

The document discusses how to recognize and combat social engineering attempts. It provides examples of tactics that social engineers use to manipulate people, such as pretending to be someone else, making things seem urgent, and refusing to provide proof of identity. The document also gives advice on how to protect yourself, such as verifying identities, being wary of pressure tactics, and escalating any suspicious situations.

Uploaded by

Alvin Bosque
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
134 views1 page

Knowledge Is Your Best Defense.: Cybercriminals YOU

The document discusses how to recognize and combat social engineering attempts. It provides examples of tactics that social engineers use to manipulate people, such as pretending to be someone else, making things seem urgent, and refusing to provide proof of identity. The document also gives advice on how to protect yourself, such as verifying identities, being wary of pressure tactics, and escalating any suspicious situations.

Uploaded by

Alvin Bosque
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Knowledge is your best defense.

Recognize and Combat Social Engineering

CYBERCRIMINALS YOU

Want access to something sensitive Examine all links and attachments


They want your boss’s information or the number of an account, or You may receive innocent-looking links or attachments which actually
even want to get into the building. Stand firm and ask for proof of contain malware; examine carefully and don’t click unless you’re
identification. certain it’s safe.

Exert pressure on you Don’t use their contact methods


Social engineers want you to act without thinking. If someone is If a message might be from an impostor, contact the real person or
pressuring you to do something without giving you time to consider it, organization through a known, safe method, such as a public phone
that’s a sign of a social engineer. number.

Send offers too good to be true Escalate


You’ve won the lottery! Or not. If an offer or opportunity seems too If someone’s story sounds fishy or they can’t prove who they are, pass
good to be true — it probably is. the issue — and your concerns — up the chain of command.

Pretend to be a client or authority figure Don’t let yourself be bullied


Social engineers will impersonate clients, bosses, friends, family or Social engineers may try to intimidate, emotionally blackmail or
others who may be able to influence you. Always take extra steps to threaten you. Don’t let it faze you.
prove their identity!

Don’t share information an attacker could use


Are unwilling to prove identity
If you share personal or sensitive information online, an attacker can
A social engineer will often deflect or get angry when asked to prove harvest it for use in impersonation or attacks.
their identity. They may try to stop you from contacting other people
for verification or refuse to give proof.

Learn more at infosecinstitute.com ©2019 Infosec, Inc. All rights reserved.

You might also like