Your assumptions about cyber criminals could be your biggest vulnerability. Challenge them now by reading this month's SECURE IT newsletter about social engineering. Learn how people are able to act as a firewall in thwarting attackers.

In this issue:

  • From WPI's CISTO: Local Storage Is Not Backed Up
  • Social Engineering Psychology & Strategies, including AI
  • Prevent Social Engineering
  • Learning with Laughter
  • Secrets of Social Engineering Video
  • Meet Jeff Eaton!
  • Featured Videos
  • Statistics and In the News
  • Diversity in Cybersecurity
  • WPI Resources

 

Preview

A large gray and white dog is laying down with a curtain covering half of it. The curtain is labeled "Spoofed Website" and the dog is labeled, "Attacker waiting for your login credentials."