There are two types of social engineering techniques. The first is computer-based – like phishing emails, scams, emails from friends that contain malware downloads, phishing links, and baiting. The second is human-based, which can include things like an impersonation of an employee with access and/or dumpster diving for information.
The newest threat to Internet security is the rise of social networking sites like Facebook, Twitter, and LinkedIn – where personal information is shared freely. These sites give social engineers easy access to important names, places, birth dates, and job information they can use to gain access to your personal and sensitive information.
Only you can prevent social engineering threats! Here are some tips to protect yourself:
If you have questions about cybersecurity, or if you want to learn more about how to stay safe online, contact the Information Security Office (ISO) at: infosec@miami.edu
Copyright: 2024 University of Miami. All Rights Reserved.
Emergency Information
Privacy Statement & Legal Notices
Individuals with disabilities who experience any technology-based barriers accessing University websites can submit details to our online form.