Security Awareness Training (2) Social Engineering and How to Protect Yourself | pTrackly
Автор: TrustCompliance
Загружено: 2025-12-30
Просмотров: 5
Описание:
Hi! I’m Trang, Co-founder of pTrackly. Welcome to the second video in our cybersecurity awareness series. In this video, we explore social engineering, one of the most effective techniques attackers use to bypass technical security and compromise organizations.
Timeline:
00:00 – 00:20: Introduction – Meet Trang and overview of the video topic
00:21 – 00:50: What is social engineering – why attackers target people
00:51 – 01:30: Phishing – common signs and examples
01:31 – 02:00: Business Email Compromise (BEC) – executive impersonation attacks
02:01 – 02:30: Pretexting and baiting – fake scenarios and enticements
02:31 – 03:00: Tailgating and quid pro quo – physical and social manipulations
03:01 – 03:30: Smishing and vishing – attacks via SMS and phone
03:31 – 03:55: Best practices – verifying requests, staying vigilant, reporting
03:56 – 04:15: Conclusion – becoming a human firewall to protect your organization
Resources & Links:
Website ➡️ https://ptrackly.dev
LinkedIn ➡️ / ptrackly
X (Twitter) ➡️ https://x.com/PtracklyComply
Email ➡️ [email protected]
#CyberSecurity #SocialEngineering #Phishing #SecurityAwareness #BEC #HumanFirewall #InformationSecurity #pTrackly #DataProtection #CyberAwareness
Повторяем попытку...
Доступные форматы для скачивания:
Скачать видео
-
Информация по загрузке: