Social Engineering: Exploiting Human Nature
How to Prevent Social Engineering Attacks
Common social Engineering Tactics
Pretexting
Baiting
Quid Pro Quo
Phishing & Smishing
Phishing
Smishing
Avoiding Phishing & Smishing
Malware & Spyware: The Silent Threats
Types of Malware
Ransomware
a paying the ransom, however, doesn’t guarantee that you’ll get your data back
Trojans
Keyloggers