Understanding Social Engineering Methods
Cyber TalkJoin the GW IT Cybersecurity Risk and Assurance and GW Privacy teams for a Cyber Talk reviewing Social Engineering Methods.
Social Engineering attacks are conducted using various methods that involve an attacker sending messages or otherwise contacting potential victims or targets. Once the attacker has established contact, either directly with a victim responding or indirectly when a victim clicks a link or downloads an attachment, the attacker steals user information such as account credentials, personal information, and funds. In some cases, the attacker installs malware on the victim's device to steal data as well as use the device to launch attacks against others. More information available in this Blog Article: Social Engineering Methods
Participants in this Cyber Talk will learn more details about how cyber attackers manipulate victims into making poor choices that enables direct and indirect criminal activity. Recognition of these methods and defensive actions will also be reviewed.
Social engineering - the art of exploiting human psychology, rather than technical hacking techniques, to gain access to buildings, systems, or data.
GW IT Cybersecurity Risk and Assurance Cyber Talks are 30-minute sessions designed to create cyber security awareness through sharing of news, trends, tips and best practices.
Additional information is available on GW Information Security's website and blog.