Pub. 8 2018-2019 Issue 4

O V E R A C E N T U R Y : B U I L D I N G B E T T E R B A N K S - H E L P I N G C O L O R A D A N S R E A L I Z E D R E A M S January • February 2019 21 Also, “security questions” and other online forms that require personal information input all exist under the umbrella of cybersecurity, as well. One favorite technique used by hackers and scammers is called social engineering, and it’s imperative that employees and consumers become familiar with the tactics employed in these scams. HowDoes Social EngineeringRelate toCybersecurity? Social engineering, in regard to cybersecurity, is the reason why most people and their employees are likely to become vic- tims of fraud. Social engineers exploit the one weakness that is found in each and every organization: human psychology. Using a variety of media, including phone calls and social media, email, and even in-person visits, these attackers trick people into offering them access to sensitive information. “Social engineers” design specific formats and online plat - forms, in some cases even building clones of well known (and trusted) websites to scampeople from, and successfullymanip- ulate a victim into taking specific actions like, say, wiring hun - dreds or thousands to a prospective client or partner. Moreover,

RkJQdWJsaXNoZXIy OTM0Njg2