Social Engineering: Why Cybersecurity is an Issue for Everyone

What’s social engineering?

Social engineering springs eternal, like a fungus

Plenty of phish in the sea

Password inspectors

Soft targets


  • Hover the mouse over links to see where they go. If the URL doesn’t look like it goes to the site it claims to go to, don’t click on it.
  • If you get a strange phone call, consider hanging up and calling the person whom the caller claims to be. Similarly, if you get a suspicious email claiming to be someone at your company, consider emailing them in a separate thread rather than replying directly to the email you received.
  • Avoid opening email attachments if you aren’t certain who the sender is. Zip files and embedded macros in Microsoft Office files are common ways to hide malware.
  • Read URLs and senders’ addresses carefully. Malicious sites may have obviously weird URLs, but many imitate normal sites. You might overlook that an address is something like “maiI” instead of “mail” (using an uppercase I to look like a lowercase l), or “” instead of “”.
  • Don’t send sensitive data like passwords, personal information, financial information, and so on until you are extremely sure who you’re sending it to. Be suspicious when someone asks for it!

Published by



Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Deika Elmi

Deika Elmi

I am a Security Risk Management Professional, one of my interests is also to help increase the number of women and BIPOC working in Cybersecurity