{"id":741,"date":"2024-02-08T19:07:27","date_gmt":"2024-02-08T19:07:27","guid":{"rendered":"https:\/\/pjleeandassoc.com\/staging\/6611\/?page_id=741"},"modified":"2024-02-16T21:20:42","modified_gmt":"2024-02-16T21:20:42","slug":"social-engineering-awareness","status":"publish","type":"page","link":"https:\/\/pjleeandassoc.com\/staging\/6611\/social-engineering-awareness\/","title":{"rendered":"Social Engineering Awareness"},"content":{"rendered":"\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-27104a9\" data-block-id=\"27104a9\"><style>.stk-27104a9{height:100px !important}<\/style><\/div>\n\n\n\n<p class=\"\">Our program prioritizes comprehensive education, personalized training sessions, and simulations that emulate real-world attacks. We emphasize the importance of communication skills and awareness of both corporate and personal security threats. Every new employee undergoes social engineering training as part of their orientation, ensuring they are equipped with the necessary tools to safeguard themselves and their families.<\/p>\n\n\n\n<p class=\"\">Our approach focuses on cultural change, ongoing education, and a commitment from the top to instill a robust security mindset throughout the organization. We provide resources, tools, and support to empower employees to recognize and report suspicious communications effectively.<\/p>\n\n\n\n<p class=\"\">In addition to baseline tests and training sessions, we offer ongoing support through newsletters and regular phishing simulations tailored to your company&#8217;s specific needs. Our goal is not only to reduce the risk of cyber-attacks but also to create a culture of security awareness and proactive defense.<\/p>\n\n\n\n<p class=\"\"><strong>Thirteen Key Program Needs<\/strong><\/p>\n\n\n\n<div class=\"wp-block-stackable-icon-list stk-block-icon-list stk-block stk-677b3e9\" data-block-id=\"677b3e9\"><ol class=\"stk-block-icon-list__ol stk-block-icon-list--column\">\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-50f799d\" data-block-id=\"50f799d\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk-block-icon-list-item__marker\" aria-hidden=\"true\"><\/span><span class=\"stk-block-icon-list-item__text\"><strong>Cultural Transformation:<\/strong>&nbsp;Foster a shift in organizational mindset towards cybersecurity.<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-1848241\" data-block-id=\"1848241\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk-block-icon-list-item__marker\" aria-hidden=\"true\"><\/span><span class=\"stk-block-icon-list-item__text\"><strong>Engaging Conversations:<\/strong>&nbsp;Facilitate open dialogues to enhance understanding and awareness.<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-736cf99\" data-block-id=\"736cf99\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk-block-icon-list-item__marker\" aria-hidden=\"true\"><\/span><span class=\"stk-block-icon-list-item__text\"><strong>Dedicated Time for Simulations:<\/strong>&nbsp;Allocate time for realistic, non-punitive simulations.<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-4bd35a9\" data-block-id=\"4bd35a9\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk-block-icon-list-item__marker\" aria-hidden=\"true\"><\/span><span class=\"stk-block-icon-list-item__text\"><strong>Continuous Learning:<\/strong>&nbsp;Provide ongoing education to keep skills and knowledge current.<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-af5df1c\" data-block-id=\"af5df1c\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk-block-icon-list-item__marker\" aria-hidden=\"true\"><\/span><span class=\"stk-block-icon-list-item__text\"><strong>Tailored Personalization:<\/strong>&nbsp;Customize training to address individual needs and preferences.<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-ed569bb\" data-block-id=\"ed569bb\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk-block-icon-list-item__marker\" aria-hidden=\"true\"><\/span><span class=\"stk-block-icon-list-item__text\"><strong>Dual Focus on Corporate and Personal Awareness:<\/strong>&nbsp;Emphasize security in both professional and personal contexts.<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-7a5277b\" data-block-id=\"7a5277b\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk-block-icon-list-item__marker\" aria-hidden=\"true\"><\/span><span class=\"stk-block-icon-list-item__text\"><strong>Adequate Resources:<\/strong>&nbsp;Allocate sufficient people, time, and tools to support cybersecurity efforts.<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-cdf6931\" data-block-id=\"cdf6931\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk-block-icon-list-item__marker\" aria-hidden=\"true\"><\/span><span class=\"stk-block-icon-list-item__text\"><strong>Communication Control:<\/strong>&nbsp;Educate on managing communication channels securely, including email, text, social media, passwords, and public Wi-Fi.<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-4d0c76b\" data-block-id=\"4d0c76b\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk-block-icon-list-item__marker\" aria-hidden=\"true\"><\/span><span class=\"stk-block-icon-list-item__text\"><strong>Clear Communication Guidelines:<\/strong>&nbsp;Provide simple, step-by-step plans for navigating daily communications securely.<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-08c25fc\" data-block-id=\"08c25fc\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk-block-icon-list-item__marker\" aria-hidden=\"true\"><\/span><span class=\"stk-block-icon-list-item__text\"><strong>Leadership Commitment:<\/strong>&nbsp;Secure commitment from top management to prioritize cybersecurity.<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-a061762\" data-block-id=\"a061762\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk-block-icon-list-item__marker\" aria-hidden=\"true\"><\/span><span class=\"stk-block-icon-list-item__text\"><strong>Recognition and Acknowledgement:<\/strong>&nbsp;Celebrate achievements and efforts in cybersecurity awareness and prevention.<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-dc69e67\" data-block-id=\"dc69e67\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk-block-icon-list-item__marker\" aria-hidden=\"true\"><\/span><span class=\"stk-block-icon-list-item__text\"><strong>Strategic Planning:<\/strong>&nbsp;Develop a comprehensive plan outlining goals, strategies, and timelines.<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-1afa0b4\" data-block-id=\"1afa0b4\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk-block-icon-list-item__marker\" aria-hidden=\"true\"><\/span><span class=\"stk-block-icon-list-item__text\"><strong>Verification Mechanisms:<\/strong>&nbsp;Implement processes to verify the authenticity of communications and actions.<\/span><\/div><\/li>\n<\/ol><\/div>\n\n\n\n<p class=\"\"><strong>Four Key questions for every communication<\/strong><\/p>\n\n\n\n<div class=\"wp-block-stackable-icon-list stk-block-icon-list stk-block stk-9a0c158\" data-block-id=\"9a0c158\"><ol class=\"stk-block-icon-list__ol stk-block-icon-list--column\">\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-458994e\" data-block-id=\"458994e\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk-block-icon-list-item__marker\" aria-hidden=\"true\"><\/span><span class=\"stk-block-icon-list-item__text\"><strong>Purposeful Inquiry:<\/strong>&nbsp;Did you actively seek this information?<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-808cee0\" data-block-id=\"808cee0\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk-block-icon-list-item__marker\" aria-hidden=\"true\"><\/span><span class=\"stk-block-icon-list-item__text\"><strong>Routine Assessment:<\/strong>&nbsp;Is this communication part of your regular professional or personal activities?<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-58165d1\" data-block-id=\"58165d1\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk-block-icon-list-item__marker\" aria-hidden=\"true\"><\/span><span class=\"stk-block-icon-list-item__text\"><strong>Awareness of External Influence:<\/strong>&nbsp;Are you mindful of potential external influences on this interaction?<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-43c8ded\" data-block-id=\"43c8ded\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk-block-icon-list-item__marker\" aria-hidden=\"true\"><\/span><span class=\"stk-block-icon-list-item__text\"><strong>Sender Verification:<\/strong>&nbsp;Have you verified the legitimacy of the sender before proceeding?<\/span><\/div><\/li>\n<\/ol><\/div>\n\n\n\n<p class=\"\">By integrating these elements into our program, we ensure a holistic approach to cybersecurity education and practice, fostering a culture of vigilance and resilience against cyber threats.<\/p>\n\n\n\n<p class=\"\"><\/p>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-aa4a192\" data-block-id=\"aa4a192\"><style>.stk-aa4a192{height:64px !important}<\/style><\/div>\n\n\n\n<p class=\"\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our program prioritizes comprehensive education, personalized training sessions, and simulations that emulate real-world attacks. We emphasize the importance of communication skills and awareness of both corporate and personal security threats. Every new employee undergoes social engineering training as part of their orientation, ensuring they are equipped with the necessary tools to safeguard themselves and their [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-741","page","type-page","status-publish","hentry"],"blocksy_meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Social Engineering Awareness - PJ Lee and Associates<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pjleeandassoc.com\/social-engineering-awareness\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Social Engineering Awareness - PJ Lee and Associates\" \/>\n<meta property=\"og:description\" content=\"Our program prioritizes comprehensive education, personalized training sessions, and simulations that emulate real-world attacks. We emphasize the importance of communication skills and awareness of both corporate and personal security threats. Every new employee undergoes social engineering training as part of their orientation, ensuring they are equipped with the necessary tools to safeguard themselves and their [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pjleeandassoc.com\/social-engineering-awareness\/\" \/>\n<meta property=\"og:site_name\" content=\"PJ Lee and Associates\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-16T21:20:42+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/pjleeandassoc.com\\\/social-engineering-awareness\\\/\",\"url\":\"https:\\\/\\\/pjleeandassoc.com\\\/social-engineering-awareness\\\/\",\"name\":\"Social Engineering Awareness - PJ Lee and Associates\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pjleeandassoc.com\\\/#website\"},\"datePublished\":\"2024-02-08T19:07:27+00:00\",\"dateModified\":\"2024-02-16T21:20:42+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/pjleeandassoc.com\\\/social-engineering-awareness\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/pjleeandassoc.com\\\/social-engineering-awareness\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/pjleeandassoc.com\\\/social-engineering-awareness\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/pjleeandassoc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Social Engineering Awareness\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/pjleeandassoc.com\\\/#website\",\"url\":\"https:\\\/\\\/pjleeandassoc.com\\\/\",\"name\":\"PJ Lee and Associates\",\"description\":\"Specialists in Compliance and Cybersecurity\",\"publisher\":{\"@id\":\"https:\\\/\\\/pjleeandassoc.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/pjleeandassoc.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/pjleeandassoc.com\\\/#organization\",\"name\":\"PJ Lee and Associates\",\"url\":\"https:\\\/\\\/pjleeandassoc.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/pjleeandassoc.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/pjleeandassoc.com\\\/staging\\\/6611\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/PJLeeLogoSmall.png\",\"contentUrl\":\"https:\\\/\\\/pjleeandassoc.com\\\/staging\\\/6611\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/PJLeeLogoSmall.png\",\"width\":188,\"height\":187,\"caption\":\"PJ Lee and Associates\"},\"image\":{\"@id\":\"https:\\\/\\\/pjleeandassoc.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Social Engineering Awareness - PJ Lee and Associates","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pjleeandassoc.com\/social-engineering-awareness\/","og_locale":"en_US","og_type":"article","og_title":"Social Engineering Awareness - PJ Lee and Associates","og_description":"Our program prioritizes comprehensive education, personalized training sessions, and simulations that emulate real-world attacks. We emphasize the importance of communication skills and awareness of both corporate and personal security threats. Every new employee undergoes social engineering training as part of their orientation, ensuring they are equipped with the necessary tools to safeguard themselves and their [&hellip;]","og_url":"https:\/\/pjleeandassoc.com\/social-engineering-awareness\/","og_site_name":"PJ Lee and Associates","article_modified_time":"2024-02-16T21:20:42+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/pjleeandassoc.com\/social-engineering-awareness\/","url":"https:\/\/pjleeandassoc.com\/social-engineering-awareness\/","name":"Social Engineering Awareness - PJ Lee and Associates","isPartOf":{"@id":"https:\/\/pjleeandassoc.com\/#website"},"datePublished":"2024-02-08T19:07:27+00:00","dateModified":"2024-02-16T21:20:42+00:00","breadcrumb":{"@id":"https:\/\/pjleeandassoc.com\/social-engineering-awareness\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pjleeandassoc.com\/social-engineering-awareness\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/pjleeandassoc.com\/social-engineering-awareness\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/pjleeandassoc.com\/"},{"@type":"ListItem","position":2,"name":"Social Engineering Awareness"}]},{"@type":"WebSite","@id":"https:\/\/pjleeandassoc.com\/#website","url":"https:\/\/pjleeandassoc.com\/","name":"PJ Lee and Associates","description":"Specialists in Compliance and Cybersecurity","publisher":{"@id":"https:\/\/pjleeandassoc.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pjleeandassoc.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/pjleeandassoc.com\/#organization","name":"PJ Lee and Associates","url":"https:\/\/pjleeandassoc.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pjleeandassoc.com\/#\/schema\/logo\/image\/","url":"https:\/\/pjleeandassoc.com\/staging\/6611\/wp-content\/uploads\/2024\/02\/PJLeeLogoSmall.png","contentUrl":"https:\/\/pjleeandassoc.com\/staging\/6611\/wp-content\/uploads\/2024\/02\/PJLeeLogoSmall.png","width":188,"height":187,"caption":"PJ Lee and Associates"},"image":{"@id":"https:\/\/pjleeandassoc.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/pjleeandassoc.com\/staging\/6611\/wp-json\/wp\/v2\/pages\/741","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pjleeandassoc.com\/staging\/6611\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/pjleeandassoc.com\/staging\/6611\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/pjleeandassoc.com\/staging\/6611\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pjleeandassoc.com\/staging\/6611\/wp-json\/wp\/v2\/comments?post=741"}],"version-history":[{"count":4,"href":"https:\/\/pjleeandassoc.com\/staging\/6611\/wp-json\/wp\/v2\/pages\/741\/revisions"}],"predecessor-version":[{"id":809,"href":"https:\/\/pjleeandassoc.com\/staging\/6611\/wp-json\/wp\/v2\/pages\/741\/revisions\/809"}],"wp:attachment":[{"href":"https:\/\/pjleeandassoc.com\/staging\/6611\/wp-json\/wp\/v2\/media?parent=741"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}