Listen to our story One Born Every Click to hear the tactics that hackers like Price Bailey use for social engineering.Disclaimer:Abi-Linda MacManaman, Bill, Daisy, Kyle, John Holden, Sarah and Price/Pryce Baily are all fictitious names used for the purpose of this fictitious story only. Any similarity to a real person is not intended nor should it be inferredDate last reviewed: 24/08/21
"By the end of this lesson, the users will be able to:- identify the tactics hackers use for social engineering,- verify the identity of callers or senders of any messages that asked them to do something,- use and share confidential information securely,- analyse what they've been asked to do in an email, phone call or other messages, especially when there is a sense of urgency,- take appropriate action if they spot unknown individuals on their premises."