Recognize social engineering
More than 85% of all hacks started with social engineering. Social engineering attacks therefore pose a significant risk to the organization but also to yourself. Virtually all types of information can be used by social engineers. It is therefore sometimes difficult to notice them. But what exactly is Social Engineering? In this course you will learn what social engineering is and why it works.
People are not always who they claim to be. This applies to contact by e-mail and telephone as well as to face-to-face meetings. It is important to know who you are dealing with and to know what authorization and access to information the person you are talking to is. How do you know who you are dealing with and how can you avoid becoming a victim of social engineering? We learn how to determine the sender's intentions and how to handle the situation. Social engineering technology uses an important link in the security chain: people. Employees have access to important information that is attractive to others. That is why it is important to recognize methods of social engineering.