When we think of social engineer, we picture them sitting in the dark, in front of a computer screen, wearing black hoodie, but social engineers are not as obvious. Have you ever had a cute child sweet-talk you into doing something you wouldn`t normally do?
Congrats, you`ve been socially engineered
AGENDA
1. Introduction
- Defeat social engineers
- What is social engineering
- Chapter quiz
2. Social Engineering Techniques
- Influence and decision-making
- Phishing
- Pretexting
- Spear phishing and whaling
- Vishing
- Baiting
- Tailgating and shoulder surfing
- Chapter quiz
3. Safeguarding Your Company from attacks
- Cybersecurity awareness training
- Properly manage passwords
- Install patches
- Spam filter
- Sandboxing
- Scan your attachments
- Anti-social engineering software
- Create policies and procedures
- Chapter quiz
4. Testing Your Defenses
- Phishing simulations
- Penetration test
- Physical Penetration test
- Social engineering penetration test
- Chapter quiz
5. Cybersecurity Awareness Program
- Training videos
- Posters and flyers
- Education on personal data security
- Cybersecurity month
- Chapter quiz
6. Conclusion