Enter your name and work email so we can record your completion.
Learn to recognize when someone is trying to manipulate you into giving up information, access, or credentials through deception rather than technology.
Social engineering is when an attacker tricks a person into doing something they should not do. Instead of hacking a computer, they hack the human. They use trust, urgency, fear, or helpfulness against you.
These attacks happen through phone calls, in-person conversations, emails, and text messages. The attacker pretends to be someone you trust: IT support, a coworker, HR, or even your boss.
An attacker calls or emails claiming to be from IT. They say there is a problem with your account and they need your password to fix it, or they ask you to install software or visit a website.
An attacker contacts you pretending to be a coworker who urgently needs access to a system, a file, or information. They may use a real coworker's name and claim their own access is not working.
Someone watches over your shoulder as you type your password or view sensitive information on your screen. This can happen in the office, at a coffee shop, or anywhere you use a device.
An attacker contacts HR or payroll pretending to be an employee. They request changes to direct deposit information, mailing addresses, or other personal details. The goal is to redirect the real employee's paycheck to the attacker's bank account.
Any time someone asks you for credentials, access, or personal information, verify the request through a separate, trusted channel before doing anything. This means:
Answer all 5 questions. Read each scenario carefully before choosing.
Passing score: 80% (4 out of 5)