- Products and Solutions
- Company
- Recent News
- Contact
Cybercriminals utilize social engineering techniques—some basic and some very sophisticated—to manipulate human emotions and trigger a response. Small steps can amount to big strides when it comes to protecting data, devices, and systems at work and at home.
For example:Â
The content or topic of a message might not be quite right or not fully relevant to you. Be on alert if the tone of an email from a colleague, friend, or relative seems inappropriate or just doesn’t “sound like” them. Likewise, be sure to question the receipt of an invoice or shipping notification that doesn’t make sense based on your ordering history. Thoroughly read what is written; don’t just skim past details.Â