Cyber Risk Control: Social Engineering

Each year there are thousands of cases of “duping” or “impersonation” commonly known as Social Engineering or Business/Vendor Email Compromise. So, what can you do to protect your town? First, know how to identify these kinds of fraudulent “change” requests. Second, adopt protocols and procedures to help prevent Social Engineering theft.Read the latest Cyber Task Force Bulletin for tips and techniques to protect against […]