menu
close
close

Experienced a potential cyberattack or suspicious activity?

What are you looking for?
close
  • published
  • updated

Social Engineering Awareness

Card Image
YouTube Video Cover
CMS Video Cover
Social engineering is a manipulation tactic used by cybercriminals to trick individuals into divulging confidential information or performing specific actions, often by exploiting trust or emotions.
https://www.youtube.com/shorts/OjncdD2V8Vs
What is it?

Social engineering is a manipulation tactic used by cybercriminals to trick individuals into divulging confidential information or performing specific actions, often by exploiting trust or emotions.

How it can impact you
  • Unauthorized access: Falling for phishing emails, calls, or messages can lead to unauthorized access to sensitive accounts.
  • Data theft: Scammers may pose as trusted entities (e.g., banks or colleagues) to steal financial or personal data.
  • Identity fraud: Social engineering can result in identity theft, financial losses, or reputational damage.
  • Corporate breaches: Businesses can suffer from data breaches caused by manipulated employees.

Example: In a well-known phishing scam, attackers posed as IT support to trick employees into revealing login credentials, compromising sensitive company systems.

What do you need to do to protect yourself?
  1. Be cautious of unsolicited emails, calls, or messages requesting sensitive information.
  2. Verify the identity of the sender or caller before sharing any personal or financial details.
  3. Avoid clicking on suspicious links or downloading attachments from unknown sources.
  4. Use security software to detect and block phishing attempts.
  5. Educate yourself about common social engineering tactics, such as urgency, fear, or impersonation.
  6. Report suspected scams to your organization or the relevant authorities.
Stay Responsible: Follow and Share CSC Content

Your support can make a significant impact in building a secure digital future for everyone:

  1. Staying informed is key to protecting yourself and your loved ones from online threats.
  2. Follow our social media channels and website for regular updates on cybersecurity best practices.
  3. Promote online safety for families, businesses, and the community by spreading this knowledge.
Card Image
Protect yourself
  1. Be cautious of unsolicited emails, calls, or messages requesting sensitive information.
  2. Verify the identity of the sender or caller before sharing any personal or financial details.
  3. Avoid clicking on suspicious links or downloading attachments from unknown sources.
  4. Use security software to detect and block phishing attempts.
  5. Educate yourself about common social engineering tactics, such as urgency, fear, or impersonation.
  6. Report suspected scams to your organization or the relevant authorities.

Stay Connected

Follow our channels
Share our posts to keep everyone around you safe
Social Icon Social Icon Social Icon Social Icon Social Icon

Take Action

Spread Awareness

Share awareness articles to help others stay protected and informed about the latest in cybersecurity.

Get Involved

Download Social Pack
Get involved with CSC and play a part in safeguarding the UAE's digital landscape. 

Policies & Resources

Program

news card image
UAE Information Assurance Standard

The UAE Information Assurance (IA) Standard is a nationally recognized framework designed to enhance the security and resilience of critical information infrastructure across the United Arab Emirates.

Informing

Government

Framework

news card image
National Cyber Security Governance Framework

The UAE is investing heavily in cyber security, using technology and skill to combat threat actors in the cyber domain, foster trust and confidence in the UAE’s digital ecosystem, and safeguard its cyberspace.

Informing

Government

Policy

news card image
National Vulnerability Disclosure Policy

The UAE Cyber Security Council's mission is to protect critical systems from vulnerabilities and secure sensitive data of government entities and CIIs from misuse and unauthorized disclosure.

Informing

Government