{"id":1860,"date":"2023-10-12T13:48:23","date_gmt":"2023-10-12T17:48:23","guid":{"rendered":"https:\/\/technews.simmons.edu\/?p=1860"},"modified":"2023-10-12T14:07:00","modified_gmt":"2023-10-12T18:07:00","slug":"avoid-becoming-a-social-engineering-victim-four-questions-to-ask-yourself","status":"publish","type":"post","link":"https:\/\/technews.simmons.edu\/?p=1860","title":{"rendered":"Avoid Becoming a Social Engineering Victim &#8211; Four Questions to Ask Yourself:"},"content":{"rendered":"\n<p>Social engineering is a scam where a cybercriminal attempts to trick someone into taking an action against their own best interests. Usually, the action results in the victim providing confidential information (like their login information) or installing malware on their computer. Most social engineering attacks have four common traits, which signal a far higher likelihood of a scam if all are present.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/technews.simmons.edu\/wp-content\/uploads\/2023\/10\/flowchart-graphic.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"745\" src=\"https:\/\/technews.simmons.edu\/wp-content\/uploads\/2023\/10\/flowchart-graphic-1024x745.jpg\" alt=\"Image describe process of possible scenarios\" class=\"wp-image-1855\" srcset=\"https:\/\/technews.simmons.edu\/wp-content\/uploads\/2023\/10\/flowchart-graphic-1024x745.jpg 1024w, https:\/\/technews.simmons.edu\/wp-content\/uploads\/2023\/10\/flowchart-graphic-300x218.jpg 300w, https:\/\/technews.simmons.edu\/wp-content\/uploads\/2023\/10\/flowchart-graphic-768x559.jpg 768w, https:\/\/technews.simmons.edu\/wp-content\/uploads\/2023\/10\/flowchart-graphic.jpg 1088w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>Long Image Description:<\/p>\n\n\n\n<p>Did the message arrive unexpectedly? Yes. Is it the first time the sender has asked you to perform the requested action? Yes. Does the request include a stressor, such as \u201cYou need to do this now\u201d? Yes. Can performing the request harm your interest? Yes. If you answer yes to all of them, you should go out of your way to confirm the request is legitimate. Use a trusted method like calling or texting the sender before taking any action.<\/p>\n\n\n\n<p>Not every message with these four traits is absolutely a social engineering scam. Our email inboxes, voicemail and postal mailboxes are full of unexpected requests; that is life. But when these four traits are present, <strong>stop<\/strong>, <strong>look<\/strong>, and <strong>think <\/strong>before you act!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Social engineering is a scam where a cybercriminal attempts to trick someone into taking an action against their own best interests. Usually, the action results in the victim providing confidential information (like their login information) or installing malware on their computer. Most social engineering attacks have four common traits, which signal a far higher likelihood [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[26,3],"tags":[147,39,146],"class_list":["post-1860","post","type-post","status-publish","format-standard","hentry","category-special-news","category-technews","tag-147","tag-cybersecurityawarenessmonth","tag-social-engineering"],"_links":{"self":[{"href":"https:\/\/technews.simmons.edu\/index.php?rest_route=\/wp\/v2\/posts\/1860","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/technews.simmons.edu\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technews.simmons.edu\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technews.simmons.edu\/index.php?rest_route=\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/technews.simmons.edu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1860"}],"version-history":[{"count":1,"href":"https:\/\/technews.simmons.edu\/index.php?rest_route=\/wp\/v2\/posts\/1860\/revisions"}],"predecessor-version":[{"id":1861,"href":"https:\/\/technews.simmons.edu\/index.php?rest_route=\/wp\/v2\/posts\/1860\/revisions\/1861"}],"wp:attachment":[{"href":"https:\/\/technews.simmons.edu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1860"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technews.simmons.edu\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1860"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technews.simmons.edu\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1860"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}