Download Attachments

File Description File size
pdf Social Engineering Red Flags Social Engineering, the art of manipulating, influencing, or deceiving you in order to gain control over your computer system. The hacker might use the phone, email, snail mail or direct contact to gain illegal access. Phishing, spear-phishing, and CEO Fraud are all examples.
163 KB
pdf Phish_Tales_eBook All it takes is one click. For a phishing attack to be effective, it takes only one person at your company to click on a link or open an email attachment for a full-scale attack to launch. Some phishing emails contain malware that launches ransomware attacks. Some ask for key identifying information. Some then use that information to impersonate company officers to get important information or money transferred. Whatever the end result, phishing is an effective method for cybercriminals to get the information they want, and it’s important for you and your employees to understand how they do it.
790 KB