SlideShare a Scribd company logo
Social Engineers  Elderly are their first choice
Social Engineers prey on the elderly. Befriend people who are lonely. Use things such as vanity, compassion and urgency to get the information that they want.
Once they have gained the elderly person’s confidence, will began to ask for personal information.
PERSONAL INFORMATION NOT TO SHARE Social Security Numbers Driver’s Licenses Numbers Date of Births Bank Accounts Credit Card Numbers
WAYS IN WHICH THE SOCIAL ENGINEER MAY TRY TO DRAW YOU IN This is a great opportunity to make a large amount of cash quickly. I only need your number for one transaction and then it will be erased forever. Let me tell you about this vacation that I would like to take you on.
I can get you a better price on this item, just give me your bank account information and let me handle everything for you. Some will even go so far as to draw you into a romantic relationship in order to get the resources they are after. Often times will try and manipulate the situation as if you are being wronged by those who are family and/or care for you.
Do not hesitate to ask questions. Ask for credentials that might show who the person is. Always ask for references. If it feels like a scam, it probably is.
Many companies, such as banks and credit card companies are posting “phsing” notices on their web pages when new scams seem to be arising. Don’t be afraid to call a company and ask if they are really making this offer.
Never give  your information out over the phone. Only use secure websites when paying a bill or banking online Change your passwords often to keep hackers from obtaining personal information
The bottom line is listen and be aware of new individuals that come into your life quickly and seem to be overly friendly.   Stay current with all of your financial assets and debts. It is easy to check your credit report, and once a year you can do so free to see if there is anything going on that you did not authorize.

More Related Content

What's hot

How to Protect Your Kid from Identity Fraud
How to Protect Your Kid from Identity FraudHow to Protect Your Kid from Identity Fraud
How to Protect Your Kid from Identity Fraud
Aaron Park
 
Does your Partner trust You
Does your Partner  trust YouDoes your Partner  trust You
Does your Partner trust You
HowtoKissOnline
 
Ballamy LLP's 2016 Christmas card to residential care homes
Ballamy LLP's 2016 Christmas card to residential care homesBallamy LLP's 2016 Christmas card to residential care homes
Ballamy LLP's 2016 Christmas card to residential care homes
Kerry Martin
 
Trilegiant 1
Trilegiant 1Trilegiant 1
Trilegiant 1
christinavernon
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
ychen2011
 
Dating
Dating Dating
Dating
AjaySoni97
 
5 COMMON SCAMS AIMED AT INTERNATIONAL STUDENTS
5 COMMON SCAMS AIMED AT INTERNATIONAL STUDENTS5 COMMON SCAMS AIMED AT INTERNATIONAL STUDENTS
5 COMMON SCAMS AIMED AT INTERNATIONAL STUDENTS
Global Opportunities
 
IdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCentsIdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCents
- Mark - Fullbright
 
How to catch a cheating wife
How to catch a cheating wifeHow to catch a cheating wife
How to catch a cheating wife
bradleycooper32
 
Internet Safety Jeopardy Game
Internet Safety Jeopardy GameInternet Safety Jeopardy Game
Internet Safety Jeopardy Game
cynthia.warner
 
Elder Care: Fraud Protection
Elder Care: Fraud ProtectionElder Care: Fraud Protection
Elder Care: Fraud Protection
caretocontinue
 
INFIDELITY: PLEASE READ
INFIDELITY: PLEASE READINFIDELITY: PLEASE READ
INFIDELITY: PLEASE READ
Melissa harnold
 
Verified Accounts
Verified AccountsVerified Accounts
Verified Accounts
rymarbett
 
Peer pressure
Peer pressurePeer pressure
Peer pressure
Shahirah Azman
 
What Is Financial Exploitation
What Is Financial ExploitationWhat Is Financial Exploitation
What Is Financial Exploitation
Lisa Sosebee
 

What's hot (15)

How to Protect Your Kid from Identity Fraud
How to Protect Your Kid from Identity FraudHow to Protect Your Kid from Identity Fraud
How to Protect Your Kid from Identity Fraud
 
Does your Partner trust You
Does your Partner  trust YouDoes your Partner  trust You
Does your Partner trust You
 
Ballamy LLP's 2016 Christmas card to residential care homes
Ballamy LLP's 2016 Christmas card to residential care homesBallamy LLP's 2016 Christmas card to residential care homes
Ballamy LLP's 2016 Christmas card to residential care homes
 
Trilegiant 1
Trilegiant 1Trilegiant 1
Trilegiant 1
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Dating
Dating Dating
Dating
 
5 COMMON SCAMS AIMED AT INTERNATIONAL STUDENTS
5 COMMON SCAMS AIMED AT INTERNATIONAL STUDENTS5 COMMON SCAMS AIMED AT INTERNATIONAL STUDENTS
5 COMMON SCAMS AIMED AT INTERNATIONAL STUDENTS
 
IdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCentsIdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCents
 
How to catch a cheating wife
How to catch a cheating wifeHow to catch a cheating wife
How to catch a cheating wife
 
Internet Safety Jeopardy Game
Internet Safety Jeopardy GameInternet Safety Jeopardy Game
Internet Safety Jeopardy Game
 
Elder Care: Fraud Protection
Elder Care: Fraud ProtectionElder Care: Fraud Protection
Elder Care: Fraud Protection
 
INFIDELITY: PLEASE READ
INFIDELITY: PLEASE READINFIDELITY: PLEASE READ
INFIDELITY: PLEASE READ
 
Verified Accounts
Verified AccountsVerified Accounts
Verified Accounts
 
Peer pressure
Peer pressurePeer pressure
Peer pressure
 
What Is Financial Exploitation
What Is Financial ExploitationWhat Is Financial Exploitation
What Is Financial Exploitation
 

Viewers also liked

Engineers-Role for Social Issues
Engineers-Role for Social IssuesEngineers-Role for Social Issues
Engineers-Role for Social Issues
Harshit Bhandari
 
Responsibilities of young engineers to society
Responsibilities of young engineers to societyResponsibilities of young engineers to society
Responsibilities of young engineers to society
Monica Murarisetti
 
Scope of engineering ethics2
Scope of engineering ethics2Scope of engineering ethics2
Scope of engineering ethics2
Peter Columa
 
Engineer in society
Engineer in societyEngineer in society
Engineer in society
Aissam Öuinöu
 
Professional responsibility and the role of the engineer
Professional responsibility and the role of the engineerProfessional responsibility and the role of the engineer
Professional responsibility and the role of the engineer
Rick Case, PMP, P.E.
 
The Nature and Scope of Sociology
The Nature and Scope of SociologyThe Nature and Scope of Sociology
The Nature and Scope of Sociology
University of Mindanao
 

Viewers also liked (6)

Engineers-Role for Social Issues
Engineers-Role for Social IssuesEngineers-Role for Social Issues
Engineers-Role for Social Issues
 
Responsibilities of young engineers to society
Responsibilities of young engineers to societyResponsibilities of young engineers to society
Responsibilities of young engineers to society
 
Scope of engineering ethics2
Scope of engineering ethics2Scope of engineering ethics2
Scope of engineering ethics2
 
Engineer in society
Engineer in societyEngineer in society
Engineer in society
 
Professional responsibility and the role of the engineer
Professional responsibility and the role of the engineerProfessional responsibility and the role of the engineer
Professional responsibility and the role of the engineer
 
The Nature and Scope of Sociology
The Nature and Scope of SociologyThe Nature and Scope of Sociology
The Nature and Scope of Sociology
 

Similar to Social engineers

All about identity theft
All about identity theftAll about identity theft
All about identity theft
Mrwilson6
 
All about identity_theft
All about identity_theftAll about identity_theft
All about identity_theft
Flora Runyenje
 
Dean r berry scam susceptibility 12 20
Dean r berry scam susceptibility 12 20Dean r berry scam susceptibility 12 20
Dean r berry scam susceptibility 12 20
Riverside County Office of Education
 
Dean r berry scam susceptibility
Dean r berry scam susceptibilityDean r berry scam susceptibility
Dean r berry scam susceptibility
Riverside County Office of Education
 
Slideshare
SlideshareSlideshare
Slideshare
ashhreeves
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
- Mark - Fullbright
 
Are You Vulnerable to Credit Card Fraud? Follow These 6 Preventive Steps
Are You Vulnerable to Credit Card Fraud? Follow These 6 Preventive StepsAre You Vulnerable to Credit Card Fraud? Follow These 6 Preventive Steps
Are You Vulnerable to Credit Card Fraud? Follow These 6 Preventive Steps
Scamchargeback
 
Scam susceptibility by Dean Berry
Scam susceptibility by Dean BerryScam susceptibility by Dean Berry
Scam susceptibility by Dean Berry
Riverside County Office of Education
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft
- Mark - Fullbright
 
You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft
- Mark - Fullbright
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
Lisa Sosebee
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
Quicken Loans Zing Blog
 
Identity Theft: The Other You
Identity Theft: The Other YouIdentity Theft: The Other You
Identity Theft: The Other You
- Mark - Fullbright
 
Identity Theft Test
Identity Theft TestIdentity Theft Test
Identity Theft Test
Lisa Sosebee
 
ID Theft - When Bad Things Happen to Your Good Name
ID Theft - When Bad Things Happen to Your Good NameID Theft - When Bad Things Happen to Your Good Name
ID Theft - When Bad Things Happen to Your Good Name
- Mark - Fullbright
 
Stop Fraud
Stop FraudStop Fraud
How To Avoid DOT Compliance Scams From Internet Fraudsters
How To Avoid DOT Compliance Scams From Internet FraudstersHow To Avoid DOT Compliance Scams From Internet Fraudsters
How To Avoid DOT Compliance Scams From Internet Fraudsters
deavidWelson
 
Scam types and its avoidance
Scam types and its avoidanceScam types and its avoidance
Scam types and its avoidance
scamtools
 
Personal loan-scams
Personal loan-scamsPersonal loan-scams
Personal loan-scams
Andri Goodwood
 
Identity Theft Overview
Identity Theft OverviewIdentity Theft Overview
Identity Theft Overview
gaby350
 

Similar to Social engineers (20)

All about identity theft
All about identity theftAll about identity theft
All about identity theft
 
All about identity_theft
All about identity_theftAll about identity_theft
All about identity_theft
 
Dean r berry scam susceptibility 12 20
Dean r berry scam susceptibility 12 20Dean r berry scam susceptibility 12 20
Dean r berry scam susceptibility 12 20
 
Dean r berry scam susceptibility
Dean r berry scam susceptibilityDean r berry scam susceptibility
Dean r berry scam susceptibility
 
Slideshare
SlideshareSlideshare
Slideshare
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Are You Vulnerable to Credit Card Fraud? Follow These 6 Preventive Steps
Are You Vulnerable to Credit Card Fraud? Follow These 6 Preventive StepsAre You Vulnerable to Credit Card Fraud? Follow These 6 Preventive Steps
Are You Vulnerable to Credit Card Fraud? Follow These 6 Preventive Steps
 
Scam susceptibility by Dean Berry
Scam susceptibility by Dean BerryScam susceptibility by Dean Berry
Scam susceptibility by Dean Berry
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft
 
You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
Identity Theft: The Other You
Identity Theft: The Other YouIdentity Theft: The Other You
Identity Theft: The Other You
 
Identity Theft Test
Identity Theft TestIdentity Theft Test
Identity Theft Test
 
ID Theft - When Bad Things Happen to Your Good Name
ID Theft - When Bad Things Happen to Your Good NameID Theft - When Bad Things Happen to Your Good Name
ID Theft - When Bad Things Happen to Your Good Name
 
Stop Fraud
Stop FraudStop Fraud
Stop Fraud
 
How To Avoid DOT Compliance Scams From Internet Fraudsters
How To Avoid DOT Compliance Scams From Internet FraudstersHow To Avoid DOT Compliance Scams From Internet Fraudsters
How To Avoid DOT Compliance Scams From Internet Fraudsters
 
Scam types and its avoidance
Scam types and its avoidanceScam types and its avoidance
Scam types and its avoidance
 
Personal loan-scams
Personal loan-scamsPersonal loan-scams
Personal loan-scams
 
Identity Theft Overview
Identity Theft OverviewIdentity Theft Overview
Identity Theft Overview
 

Recently uploaded

Navigating Your Financial Future: Comprehensive Planning with Mike Baumann
Navigating Your Financial Future: Comprehensive Planning with Mike BaumannNavigating Your Financial Future: Comprehensive Planning with Mike Baumann
Navigating Your Financial Future: Comprehensive Planning with Mike Baumann
mikebaumannfinancial
 
How to Invest in Cryptocurrency for Beginners: A Complete Guide
How to Invest in Cryptocurrency for Beginners: A Complete GuideHow to Invest in Cryptocurrency for Beginners: A Complete Guide
How to Invest in Cryptocurrency for Beginners: A Complete Guide
Daniel
 
What Lessons Can New Investors Learn from Newman Leech’s Success?
What Lessons Can New Investors Learn from Newman Leech’s Success?What Lessons Can New Investors Learn from Newman Leech’s Success?
What Lessons Can New Investors Learn from Newman Leech’s Success?
Newman Leech
 
快速办理(RWTH毕业证书)德国亚琛工业大学毕业证录取通知书一模一样
快速办理(RWTH毕业证书)德国亚琛工业大学毕业证录取通知书一模一样快速办理(RWTH毕业证书)德国亚琛工业大学毕业证录取通知书一模一样
快速办理(RWTH毕业证书)德国亚琛工业大学毕业证录取通知书一模一样
yeuwffu
 
KYC Compliance: A Cornerstone of Global Crypto Regulatory Frameworks
KYC Compliance: A Cornerstone of Global Crypto Regulatory FrameworksKYC Compliance: A Cornerstone of Global Crypto Regulatory Frameworks
KYC Compliance: A Cornerstone of Global Crypto Regulatory Frameworks
Any kyc Account
 
欧洲杯足彩-欧洲杯足彩押注-欧洲杯足彩押注官网|【​网址​🎉ac99.net🎉​】
欧洲杯足彩-欧洲杯足彩押注-欧洲杯足彩押注官网|【​网址​🎉ac99.net🎉​】欧洲杯足彩-欧洲杯足彩押注-欧洲杯足彩押注官网|【​网址​🎉ac99.net🎉​】
欧洲杯足彩-欧洲杯足彩押注-欧洲杯足彩押注官网|【​网址​🎉ac99.net🎉​】
mukeshomran942
 
13 Jun 24 ILC Retirement Income Summit - slides.pptx
13 Jun 24 ILC Retirement Income Summit - slides.pptx13 Jun 24 ILC Retirement Income Summit - slides.pptx
13 Jun 24 ILC Retirement Income Summit - slides.pptx
ILC- UK
 
Singapore 2024 Sustainability Slides.pdf
Singapore 2024 Sustainability Slides.pdfSingapore 2024 Sustainability Slides.pdf
Singapore 2024 Sustainability Slides.pdf
International Federation of Accountants
 
The various stages, after the initial invitation has been made to the public ...
The various stages, after the initial invitation has been made to the public ...The various stages, after the initial invitation has been made to the public ...
The various stages, after the initial invitation has been made to the public ...
Yashwanth Rm
 
Singapore 2024 Event The Way Forward Slides
Singapore 2024 Event The Way Forward SlidesSingapore 2024 Event The Way Forward Slides
Singapore 2024 Event The Way Forward Slides
International Federation of Accountants
 
Singapore Event 2024 IPSASB Update Slides
Singapore Event 2024 IPSASB Update SlidesSingapore Event 2024 IPSASB Update Slides
Singapore Event 2024 IPSASB Update Slides
International Federation of Accountants
 
Tiểu luận: PURPOSE OF BUDGETING IN SME.docx
Tiểu luận: PURPOSE OF BUDGETING IN SME.docxTiểu luận: PURPOSE OF BUDGETING IN SME.docx
Tiểu luận: PURPOSE OF BUDGETING IN SME.docx
lamluanvan.net Viết thuê luận văn
 
5 Compelling Reasons to Invest in Cryptocurrency Now
5 Compelling Reasons to Invest in Cryptocurrency Now5 Compelling Reasons to Invest in Cryptocurrency Now
5 Compelling Reasons to Invest in Cryptocurrency Now
Daniel
 
Application Of mathematics in Finance- Time Value of Money
Application Of mathematics in Finance- Time Value of MoneyApplication Of mathematics in Finance- Time Value of Money
Application Of mathematics in Finance- Time Value of Money
vineetabhati1
 
GUIA_LEGAL_CHAPTER_4_FOREIGN TRADE CUSTOMS.pdf
GUIA_LEGAL_CHAPTER_4_FOREIGN TRADE CUSTOMS.pdfGUIA_LEGAL_CHAPTER_4_FOREIGN TRADE CUSTOMS.pdf
GUIA_LEGAL_CHAPTER_4_FOREIGN TRADE CUSTOMS.pdf
ProexportColombia1
 
Calculation of compliance cost: Veterinary and sanitary control of aquatic bi...
Calculation of compliance cost: Veterinary and sanitary control of aquatic bi...Calculation of compliance cost: Veterinary and sanitary control of aquatic bi...
Calculation of compliance cost: Veterinary and sanitary control of aquatic bi...
Alexander Belyaev
 
Economic trends from a business point of view (May 2024)
Economic trends from a business point of view (May 2024)Economic trends from a business point of view (May 2024)
Macroeconomic-digest-of-Ukraine-0624-Eng.pdf
Macroeconomic-digest-of-Ukraine-0624-Eng.pdfMacroeconomic-digest-of-Ukraine-0624-Eng.pdf
Macroeconomic-digest-of-Ukraine-0624-Eng.pdf
olaola5673
 
Call Girls Chennai 🎉 7339748667 🎉 With No Advance Payment
Call Girls Chennai 🎉 7339748667 🎉 With No Advance PaymentCall Girls Chennai 🎉 7339748667 🎉 With No Advance Payment
Call Girls Chennai 🎉 7339748667 🎉 With No Advance Payment
prijesh mathew
 
China's Investment Leader - Dr. Alyce SU
China's Investment Leader - Dr. Alyce SUChina's Investment Leader - Dr. Alyce SU
China's Investment Leader - Dr. Alyce SU
msthrill
 

Recently uploaded (20)

Navigating Your Financial Future: Comprehensive Planning with Mike Baumann
Navigating Your Financial Future: Comprehensive Planning with Mike BaumannNavigating Your Financial Future: Comprehensive Planning with Mike Baumann
Navigating Your Financial Future: Comprehensive Planning with Mike Baumann
 
How to Invest in Cryptocurrency for Beginners: A Complete Guide
How to Invest in Cryptocurrency for Beginners: A Complete GuideHow to Invest in Cryptocurrency for Beginners: A Complete Guide
How to Invest in Cryptocurrency for Beginners: A Complete Guide
 
What Lessons Can New Investors Learn from Newman Leech’s Success?
What Lessons Can New Investors Learn from Newman Leech’s Success?What Lessons Can New Investors Learn from Newman Leech’s Success?
What Lessons Can New Investors Learn from Newman Leech’s Success?
 
快速办理(RWTH毕业证书)德国亚琛工业大学毕业证录取通知书一模一样
快速办理(RWTH毕业证书)德国亚琛工业大学毕业证录取通知书一模一样快速办理(RWTH毕业证书)德国亚琛工业大学毕业证录取通知书一模一样
快速办理(RWTH毕业证书)德国亚琛工业大学毕业证录取通知书一模一样
 
KYC Compliance: A Cornerstone of Global Crypto Regulatory Frameworks
KYC Compliance: A Cornerstone of Global Crypto Regulatory FrameworksKYC Compliance: A Cornerstone of Global Crypto Regulatory Frameworks
KYC Compliance: A Cornerstone of Global Crypto Regulatory Frameworks
 
欧洲杯足彩-欧洲杯足彩押注-欧洲杯足彩押注官网|【​网址​🎉ac99.net🎉​】
欧洲杯足彩-欧洲杯足彩押注-欧洲杯足彩押注官网|【​网址​🎉ac99.net🎉​】欧洲杯足彩-欧洲杯足彩押注-欧洲杯足彩押注官网|【​网址​🎉ac99.net🎉​】
欧洲杯足彩-欧洲杯足彩押注-欧洲杯足彩押注官网|【​网址​🎉ac99.net🎉​】
 
13 Jun 24 ILC Retirement Income Summit - slides.pptx
13 Jun 24 ILC Retirement Income Summit - slides.pptx13 Jun 24 ILC Retirement Income Summit - slides.pptx
13 Jun 24 ILC Retirement Income Summit - slides.pptx
 
Singapore 2024 Sustainability Slides.pdf
Singapore 2024 Sustainability Slides.pdfSingapore 2024 Sustainability Slides.pdf
Singapore 2024 Sustainability Slides.pdf
 
The various stages, after the initial invitation has been made to the public ...
The various stages, after the initial invitation has been made to the public ...The various stages, after the initial invitation has been made to the public ...
The various stages, after the initial invitation has been made to the public ...
 
Singapore 2024 Event The Way Forward Slides
Singapore 2024 Event The Way Forward SlidesSingapore 2024 Event The Way Forward Slides
Singapore 2024 Event The Way Forward Slides
 
Singapore Event 2024 IPSASB Update Slides
Singapore Event 2024 IPSASB Update SlidesSingapore Event 2024 IPSASB Update Slides
Singapore Event 2024 IPSASB Update Slides
 
Tiểu luận: PURPOSE OF BUDGETING IN SME.docx
Tiểu luận: PURPOSE OF BUDGETING IN SME.docxTiểu luận: PURPOSE OF BUDGETING IN SME.docx
Tiểu luận: PURPOSE OF BUDGETING IN SME.docx
 
5 Compelling Reasons to Invest in Cryptocurrency Now
5 Compelling Reasons to Invest in Cryptocurrency Now5 Compelling Reasons to Invest in Cryptocurrency Now
5 Compelling Reasons to Invest in Cryptocurrency Now
 
Application Of mathematics in Finance- Time Value of Money
Application Of mathematics in Finance- Time Value of MoneyApplication Of mathematics in Finance- Time Value of Money
Application Of mathematics in Finance- Time Value of Money
 
GUIA_LEGAL_CHAPTER_4_FOREIGN TRADE CUSTOMS.pdf
GUIA_LEGAL_CHAPTER_4_FOREIGN TRADE CUSTOMS.pdfGUIA_LEGAL_CHAPTER_4_FOREIGN TRADE CUSTOMS.pdf
GUIA_LEGAL_CHAPTER_4_FOREIGN TRADE CUSTOMS.pdf
 
Calculation of compliance cost: Veterinary and sanitary control of aquatic bi...
Calculation of compliance cost: Veterinary and sanitary control of aquatic bi...Calculation of compliance cost: Veterinary and sanitary control of aquatic bi...
Calculation of compliance cost: Veterinary and sanitary control of aquatic bi...
 
Economic trends from a business point of view (May 2024)
Economic trends from a business point of view (May 2024)Economic trends from a business point of view (May 2024)
Economic trends from a business point of view (May 2024)
 
Macroeconomic-digest-of-Ukraine-0624-Eng.pdf
Macroeconomic-digest-of-Ukraine-0624-Eng.pdfMacroeconomic-digest-of-Ukraine-0624-Eng.pdf
Macroeconomic-digest-of-Ukraine-0624-Eng.pdf
 
Call Girls Chennai 🎉 7339748667 🎉 With No Advance Payment
Call Girls Chennai 🎉 7339748667 🎉 With No Advance PaymentCall Girls Chennai 🎉 7339748667 🎉 With No Advance Payment
Call Girls Chennai 🎉 7339748667 🎉 With No Advance Payment
 
China's Investment Leader - Dr. Alyce SU
China's Investment Leader - Dr. Alyce SUChina's Investment Leader - Dr. Alyce SU
China's Investment Leader - Dr. Alyce SU
 

Social engineers

  • 1. Social Engineers Elderly are their first choice
  • 2. Social Engineers prey on the elderly. Befriend people who are lonely. Use things such as vanity, compassion and urgency to get the information that they want.
  • 3. Once they have gained the elderly person’s confidence, will began to ask for personal information.
  • 4. PERSONAL INFORMATION NOT TO SHARE Social Security Numbers Driver’s Licenses Numbers Date of Births Bank Accounts Credit Card Numbers
  • 5. WAYS IN WHICH THE SOCIAL ENGINEER MAY TRY TO DRAW YOU IN This is a great opportunity to make a large amount of cash quickly. I only need your number for one transaction and then it will be erased forever. Let me tell you about this vacation that I would like to take you on.
  • 6. I can get you a better price on this item, just give me your bank account information and let me handle everything for you. Some will even go so far as to draw you into a romantic relationship in order to get the resources they are after. Often times will try and manipulate the situation as if you are being wronged by those who are family and/or care for you.
  • 7. Do not hesitate to ask questions. Ask for credentials that might show who the person is. Always ask for references. If it feels like a scam, it probably is.
  • 8. Many companies, such as banks and credit card companies are posting “phsing” notices on their web pages when new scams seem to be arising. Don’t be afraid to call a company and ask if they are really making this offer.
  • 9. Never give your information out over the phone. Only use secure websites when paying a bill or banking online Change your passwords often to keep hackers from obtaining personal information
  • 10. The bottom line is listen and be aware of new individuals that come into your life quickly and seem to be overly friendly. Stay current with all of your financial assets and debts. It is easy to check your credit report, and once a year you can do so free to see if there is anything going on that you did not authorize.