Security Awareness Training – Social Engineering

March 18, 2025

Join us for an essential Security Awareness Training session focused on Social Engineering. In this session, we delve into the critical importance of cybersecurity awareness and how you, as an individual, serve as the first line of defense against cyber threats.

 

Key Topics Covered:

  • The Cost of a Data Breach: Understand the financial and reputational impact of data breaches, with the global average cost reaching $4.88 million USD in 2024.
  • Real-World Example: Learn from the Change Healthcare Breach of 2024, the largest in U.S. history, affecting 100 million people, and discover how compromised credentials and lack of multi-factor authentication (MFA) led to a $2.87 million loss.
  • Social Engineering Tactics: Explore how attackers exploit human tendencies like trust, fear, and curiosity through phishing, smishing, and vishing attacks. Did you know that 98% of cyberattacks use social engineering tactics?
  • Red Flags to Watch For: Learn how to spot phishing emails, smishing texts, and vishing calls by identifying common red flags such as generic greetings, urgent tones, unexpected links, and requests for sensitive information.
  • What to Do if You’re Targeted: Gain practical steps to take if you encounter a phishing email, smishing text, or vishing call, including how to report suspicious messages and protect your information.
  • What to Do if You’ve Been Scammed: If you fall victim to a scam, don’t panic! We provide clear guidance on how to respond, including disconnecting your devices, contacting technical support, and reporting the incident to authorities like the FBI and CISA.
  • Cybersecurity is not just an IT issue—it’s everyone’s responsibility. Whether you’re an employee, business owner, parent, or senior, this training is designed to equip you with the knowledge to reduce cybersecurity risks and protect yourself and your organization.

 

Why This Matters:

Remember: Technology alone cannot protect you. Training is a must to stay ahead of evolving threats. Watch this session to strengthen your cybersecurity awareness and become a more informed and vigilant defender against social engineering attacks.

 

Stay safe, stay aware, and remember—YOU are the first line of defense!

 

You May Like These Posts

Security Questionnaires: You Can’t Just Blame the Intern

Let’s face it—no one enjoys security questionnaires. They are tedious and time-consuming, and it’s easy to question their real effectiveness in mitigating security risks, especially since they’re often a check-the-box exercise. However, in today’s digital landscape, they are unavoidable for building and maintaining trust with customers. Join us as we confront this harsh reality: despite […]

Internal or External Resources? YES!

Imagine trusting a neighborhood kid to take care of your dog while on vacation. While they may be capable of completing the task you’ve outlined; they will likely only do exactly as you ask. The dog gets what they need and the job is done.   In contrast, imagine trusting an adult neighbor caring for […]

Why Cybersecurity is as much Art as Science

In this kickoff episode of The Art of Cybersecurity, host Cheri Hotman shares why this podcast exists and what listeners can expect. Cyber isn’t just science or technology — it’s art. It’s messy, constrained, people-driven, and ultimately about mitigating risk to protect people and data. Cheri cuts through the noise of “easy button” tools, audit-passing […]

CMMC 101: What you need to know from framework to final rule

With a staggering loss of $3.5 billion in intellectual property through its contractors a year, the Department of Defense (DoD) needed a way to shore up cybersecurity in the Defense Industrial Base (DIB). From this need, the Cybersecurity Maturity Model Certification (CMMC) program was created with an initial release in 2020.   The entire purpose […]

Real Life GRC Horror Stories: Top Mistakes Haunting Your Program

Just in time for Halloween, we’re pulling back the curtain on the Top 10 GRC Nightmares plaguing organizations today. From programs that only exist to “pass the audit,” to treating compliance as a checkbox exercise, these haunting mistakes can leave your organization more vulnerable than you realize. In this session, we’ll identify the most common […]

Security Awareness Training – Artificial Intelligence & Emerging Security Risks

Join us for an essential Security Awareness Training session focused on the evolving landscape of Artificial Intelligence (AI) and the emerging security risks that come with it. In this session, we explore how AI is being used in everyday tools—and how it's also creating new opportunities for threat actors. This training emphasizes awareness, responsible usage, […]

People, Process, Technology: It Takes All 3

When it comes to navigating the maze of Governance, Risk, and Compliance, there's one simple rule: finding perfect harmony between cutting-edge tech and good, old-fashioned human know-how.   Picture this: a Chief Information Security Officer (CISO) paints a vision of the future where compliance is seamlessly automated. "In two to three years, we'll have everything […]

Vulnerability Scans: Only Part of the Equation

There are two primary ways we see companies manage vulnerabilities… one of them significantly riskier than the other.   Reactive strategies rely on a problem to arise before taking action. This makes reactive the riskier option of the two, hopefully for obvious reasons. Using a reactive strategy is like waiting for an electric bill to […]

Choosing the Right Cybersecurity Framework: A Practical Guide for Leaders

Speakers: Cheri Hotman and Tanya WadeHosted by: Hotman Group   Why Choosing the Right Framework Matters   Passing an audit is no longer enough. Many organizations still treat cybersecurity as a one-time project, something to "check off" rather than an integrated, living part of their business operations.   During this session, Cheri Hotman and Tanya […]

Post A Comment

Leave a Reply

Your email address will not be published.

{{brizy_dc_image_alt imageSrc=
Endless audits and customer demands were never supposed to replace real security.
We build, implement, and run Cyber GRC programs that reduce risk, protect the business, and still pass audits.

Hotman Group is a certified

woman-owned business (WOSB)

Hotman Group, LLC

Fort Worth, TX

Privacy Policy | Terms of Service | All Rights Reserved © Hotman Group, LLC