SOCIAL ENGINEERING – Mitigations

• Slow down when you receive an emotion provoking email or text. Nothing sent in an email could be urgent enough that taking 60 seconds to review the sending email address, the syntax and spelling, and the logic of the message, would change the outcome of a situation.

• Verify whether the email address of any sender is legitimate.

• Think about whether odd requests from someone claiming to be a supervisor is logical. Ask questions if it’s not.

• Limit the amount of personal information you share on social media with people who are not truly their “friends”.

• Info you DO put on social media – don’t use in passwords, security questions and other places where hackers could use it to gain access to corporate networks. Without that data, it’s harder for hackers to craft personalized appeals to target specific employees for phishing exploits.