What to do:
The simulation contains four scenarios that will continue even if the user’s information, money, or electronics are compromised and if the user effectively protects themselves from the social engineering attack. After each of these results, there will be an explanation of why your selection was correct or incorrect and what the correct answer should have been and why.
This is a learning simulation and you should think about what you would do in each of the scenarios and why. I hope you learn a lot about protecting your personal information from social engineering attacks and I hope you implement what you have learned here in your daily life! Have fun!
Please click the button below to start at the beginning of the simulation:
Social Engineering Recommendations:
Malicious actors who engage in social engineering attacks prey off of human psychology and curiosity in order to compromise their targets’ information. With this human-centric focus in mind, it is up to organizations to help their employees counter these types of attacks.
Here are a few tips that organizations can incorporate into their security awareness training programs that will help users to avoid social engineering schemes:
-
Do not open any emails from untrusted sources. Contact a friend or family member in person or by phone if you receive a suspicious email message from them.
-
Do not give offers from strangers the benefit of the doubt. If they seem too good to be true, they probably are.
-
Lock your laptop whenever you are away from your workstation.
-
Purchase anti-virus software. No AV solution can defend against every threat that seeks to jeopardize users’ information, but they can help protect against some.
-
Read your company’s privacy policy to understand under what circumstances you can or should let a stranger into the building.