Cyber Risk Control: Social Engineering
Each year there are thousands of cases of “duping” or “impersonation” commonly known as Social Engineering or Business/Vendor Email Compromise.
So, what can you do to protect your town?
First, know how to identify these kinds of fraudulent “change” requests. Second, adopt protocols and procedures to help prevent Social Engineering theft.
Read the latest Cyber Task Force Bulletin for tips and techniques to protect against Social Engineering theft. For additional information visit the Center for Internet Security