Social engineering attacks account for a massive portion of all cyber attacks, and studies show that these attacks are on the rise. Social engineers are clever and use manipulative tactics to trick their victims into disclosing private or sensitive information. Once a social engineer has tricked their victim into providing this information, they can use it to further their attacks. This resource explores the six common types of social engineering attacks.
Do you have feedback on this resource?
Thank you for your feedback as we strive to curate and publish resources to help social impact organizations succeed with data.
Related Guides & Resources
Data Security for Nonprofits
Data security is an important part of creating data-driven organizations. If an organization is investing in collecting and utilizing more data it must also invest in protecting that data. Unlike some data initiatives, security practices are often invisible to your employees and end-users, and for that reason can be underutilized. This guide outlines some of the important data security practices that organizations should consider developing and deploying.
Resources from Principles for Digital Development, Personify / WildApricot and +6