Загрузка...

Cybersecurity Series Module 5.4: How to recognize & respond to social engineering

Discover how cybercriminals exploit human psychology through social engineering in this engaging explanatory video. Learn how attackers use tactics like phishing, pretexting, and baiting to manipulate trust, fear, and curiosity with real-world examples. Packed with prevention tips, a practice quiz, and hands-on exercises using platforms like KnowBe4 (https://www.knowbe4.com/), this video makes cybersecurity simple and actionable. Explore insights from the 2025 Unit 42 Global Incident Response Report (https://unit42.paloaltonetworks.com/2025-unit-42-global-incident-response-report-social-engineering-edition/), Coalition Inc. case studies (https://cdn.intelligencebank.com/us/share/NMXD/6Kq3/Dn8rk/original/UK+Case+Study+-+Construction+-+BEC+despite+MFA and https://cdn.intelligencebank.com/us/share/NMXD/6Kq3/ZY9LR/original/Coalition_Case-Study_Law-Firm-Social-Engineering), Verizon's 2024 Data Breach Investigations Report (https://www.verizon.com/business/en-gb/resources/reports/2024/dbir/2024-dbir-data-breach-investigations-report.pdf), Barracuda's spear phishing report (https://assets.barracuda.com/assets/docs/dms/Spear-phishing-vol7.pdf), TechRepublic’s Social Engineering Awareness Policy (https://www.techrepublic.com/resource-library/it-policy/social-engineering-awareness-policy/), and training platforms like Cybrary (https://www.cybrary.it/) and SANS (https://www.sans.org/). Stay safe with practical strategies to spot and stop cyber threats!

Видео Cybersecurity Series Module 5.4: How to recognize & respond to social engineering канала wealthconcept365
Яндекс.Метрика
Все заметки Новая заметка Страницу в заметки
Страницу в закладки Мои закладки
На информационно-развлекательном портале SALDA.WS применяются cookie-файлы. Нажимая кнопку Принять, вы подтверждаете свое согласие на их использование.
О CookiesНапомнить позжеПринять