About the Training
This totally interactive module covers the social engineering “red flags” that can be found in emails, digital messages, over the phone, and through in-person social engineering attacks.
The viewpoint of a hacker will be explained on what he does, why he does it and most importantly, how the organization might be able to spot the red flags in each of the hacker’s methods. By knowing what to look for, the employee becomes able to spot a social engineering attack and not be tricked.
This Training gives employees the tools they need to recognize these types of attacks, which helps groom more discerning, responsible employees who are better equipped to protect both themselves and their organization.
Duration: 1 hour