Gretel Egan | June 22, 2016

Wombat Vlog: How to Avoid Social Engineering Scams

Wombat_Vlog_2016.jpgIn this second part of our two-part Wombat vlog about social engineering, I offer tips for avoiding social engineering scams. I advise users to recognize that they are in the power seat and that their engagement is the difference between a successful and unsuccessful attack. I also explain the importance of verification and why users need to ensure that they operate within a true "circle of trust" when it comes to unsolicited communications and visitors.

This video allows you to share practical information with your end users in straightforward, digestible terms they can understand. It is a good way to reinforce some of the key messages present in our Anti-Phishing Training Suite, which provides simulated phishing assessments and hands-on training about the social engineering techniques cyber criminals use to trick end users into compromising data and systems. This suite of tools is the ideal foundation on which to build your security awareness training program.

 

Did you miss the first segment of our social engineering vlog? Check it out now.

What is Social Engineering?

 

Subscribe to Our Blog

2018 State of the Phish Report  Protect your organization from phishing attacks. Download Now
2018 Beyond the Phish Report  Protect your organization from threats including and beyond phishing. Download Now