1 of 24

2 of 24

Cyber Security

3 of 24

Social Engineering

4 of 24

This is what Social Engineering actually looks like

5 of 24

Social engineering is a form of techniques employed by cybercriminals designed to lure unsuspecting users into sending them their confidential data, infecting their computers with malware or opening links to infected sites.

6 of 24

Types of Social Engineering

  • Phishing Email
  • Spear Phishing Email
  • Phone VPhishing (Vishing)
  • Quid pro quo
  • Low tech “Spying” - Watching over your shoulder
  • Baiting
  • Tailgating

7 of 24

8 of 24

9 of 24

Types of Social Engineering

  • Phishing Email
  • Spear Phishing Email
  • Phone VPhishing (Vishing)
  • Quid pro quo (Sharing details for something else)
  • Low tech “Spying” - Watching over your shoulder
  • Baiting
  • Tailgating

10 of 24

Spotting Phishing Emails

  • Look at who the email is from

11 of 24

12 of 24

Spotting Phishing Emails

  • Look at who the email is from
  • Check for spelling mistakes

13 of 24

Spotting Phishing Emails

  • Look at who the email is from
  • Check for spelling mistakes
  • Does the email have an attachment?

14 of 24

Spotting Phishing Emails

  • Look at who the email is from
  • Check for spelling mistakes
  • Does the email have an attachment?
  • Does it contain urgent or threatening language?

15 of 24

16 of 24

17 of 24

PCSD1 Phishing Test Results

18 of 24

How are we targeted?

19 of 24

20 of 24

21 of 24

22 of 24

How do we protect ourselves

  • Improve our emotional response
  • Keep our devices safe and secure
  • Think before we act, slow down
  • Stay aware of our surroundings
  • Protect our online accounts

23 of 24

24 of 24