protect your organisation

Know with whom you are dealing

Social engineers often pose as someone else, whether through email, phone calls, or personal meetings. How can you determine who you are really dealing with? And how do you avoid becoming a victim of social engineering? This microlearning answers these questions and shows how to best respond to suspicious situations to prevent sharing sensitive information with the wrong people.

Request a demo
Social engineers

After 5 minutes, you can answer questions such as:

  • How do malicious individuals obtain sensitive information?

  • How do you ensure that you only share information with the right people?

 

Social engineers

Request free demo.

Curious? Simply register here for a free demo.