Before submitting your name, email address, or other personal information on a website, look for the site's privacy policy. This policy should explain how the information will be used and whether or not the information will be distributed to other organizations.| Cybersecurity and Infrastructure Security Agency CISA
In a social engineering attack, an attacker uses human interaction to piece together enough information to infiltrate an organization's network.| Cybersecurity and Infrastructure Security Agency CISA
Passwords are a common form of authentication and are often the only barrier between you and your personal information. There are several programs attackers can use to help guess or crack passwords.| Cybersecurity and Infrastructure Security Agency CISA