AVOIDING PHISHERS, HACKERS,
AND SOCIAL ENGINEERS
“Social engineering” is the use of trickery to fool people into divulging confidential information or into facilitating unauthorized access into computers or accounts. Simply put, humans are easier to hack than machines. Hackers use a set of techniques that people will often fall for. Even the strongest passwords will not provide protection if people are tricked into revealing them.
Roughly 90% of malware requires a human interaction to infect. Much hacking isn’t done through technical wizardry but through trickery. Effective data security depends upon offering phishing protection and educating people about how to recognize and avoid the cons and tricks fraudsters use.
As one writer aptly states:
Social engineering and this kind of “soft” hacking isn’t particularly new, but it’s rising in popularity among even untrained and unsophisticated hackers, mostly because it’s easy to do, can net a ton of information, and, of course, the human systems set up around our technology are almost always the weakest link in the security chain. A little attention to detail and vigilance goes a long way.
Another writer explains in CSO Magazine:
People are fooled every day by these cons because they haven’t been adequately warned about social engineers. As CSO blogger Tom Olzak points out, human behavior is always the weakest link in any security program. And who can blame them? Without the proper education, most people won’t recognize a social engineer’s tricks because they are often very sophisticated.
This information security training course (~15 minutes) teaches phishing protection and how to avoid being victimized by hacker tricks and social engineering. The course covers:
• the various techniques of social engineering (such as phishing, baiting, and pretexting)
• common phishing techniques
• the types of threats contained in email
• the dangers from visiting websites or downloading software
The course teaches how to recognize the tricks that fraudsters use and how to avoid being victimized. Key points are reinforced and tested with 8 quiz questions involving memorable scenarios so trainees can apply their knowledge. The course is fast, lively, and very interactive.
This information security training course consists of a fusion of portions of the following short topic courses:
(1) social engineering
(4) websites and software
We also have a 10-minute version of this course.
- Learn about the various techniques of social engineering (such as phishing, baiting, and pretexting)
- Become familiar with common phishing techniques
- Understand the types of threats contained in email, and the dangers from visiting websites or downloading software
Please Contact Us to Evaluate this Program or Others
We can provide you with a login so you can evaluate the programs.
About TeachPrivacy and Our Training Philosophy
TeachPrivacy was founded by Professor Daniel J. Solove, the leading expert on privacy and data security law. He is deeply involved in the creation of all training programs because he believes that training works best when made by subject-matter experts and by people with extensive teaching experience.
According to Professor Solove: “Great training isn’t about slickness or tricks. It is about teaching. The goal is to make people understand, care, and remember. Great training is made with genuine passion – to make people love training, it must be made with love. Excellent substance is essential. The material must be explained clearly, understandably, and concretely. The content must be short and to the point – and it must be engaging. Slickness and gimmicks can’t compensate for lackluster substance.”
TeachPrivacy provides privacy awareness training, information security awareness training, phishing training, HIPAA training, FERPA training, PCI training, as well as training on many other privacy and security topics.
Professor Solove is a law professor at George Washington University Law School. He has taught privacy law every year since 2000, has published 10 books and more than 50 articles, including the leading textbook on information privacy law and a short guidebook on the subject. His LinkedIn blog has more than 1 million followers. Click here for more information about Professor Solove.