Social Engineering Sample Clauses

Social Engineering. Client agrees and understands that InfoSight will not be responsible or held liable for any cyberattacks wherein social engineering tactics are employed, including any damages resulting therefrom. For example, common scams to test employees' adherence to the security policies and practices, phishing attempts, business email compromise, corporate account takeover, or ransomware attacks leading to cyber extortion, or the transfer of Client funds.
AutoNDA by SimpleDocs
Social Engineering a. Social engineering is when someone manipulates you into performing a certain action or divulging confidential information. Social engineers employ many approaches to this – some of the more prominent techniques include: 1. Call or email from someone pretending to represent a legitimate company you might normally do business with. Xxxxxx asks for your account information (SSN, passwords, credit card numbers) to “verify” your account. 2. Call from a supposed court employee regarding jury duty – caller requests personal information under threat of fine or prosecution. b. What you should do: 1. Never provide account information to these callers. Hang up and call the phone number on your account statement or on the company’s or agency’s website to find out if the entity that supposedly contacted you actually needs the requested information.
Social Engineering. A Social Engineering Engagement is designed to determine the susceptibility of company staff to an electronic or telephone-based social engineering attack and the extent to which internal users may represent an exploitable risk to the organization’s security. The engagement will determine what level of access can be achieved through disclosure of credentials or confidential information.
Social Engineering. These attacks result from internal weaknesses which expose the school’s system, e.g. poor password use.
Social Engineering. Users shall be aware that "social engineers" may ------------------ impersonate others to obtain information in a fraudulent manner. Users shall provide information only to persons known or verified to have a need to know such information for a Buyer-approved purpose. If a caller does not appear to be legitimate, User should report the incident to the Buyer Sponsor or Buyer Security.
Social Engineering. The parties agree that Customer will not order, and Verizon will not perform, any IR Services under this Agreement that would constitute social engineering services or assessments.
Social Engineering. Assess vulnerabilities to various types of Phishing attacks. • Determine adequacy of physical access security and protocols.
AutoNDA by SimpleDocs
Social Engineering. The assessor will/will not use social engineering during the assessment. If social engineering is in scope, the target of this attack will be the client/the service provider/both the client and the service provider.
Social Engineering. SPECIMEN We will pay for Social Engineering Loss resulting directly from a Social Engineering Incident, provided such Social Engineering Incident is first Discovered during the Policy Period. With respect to this Insuring Agreement 7: a. Money means currency, coins or bank notes in current use and having a face value, travelers' checks, register checks and money orders held for sale to the public. The term Money does not include digital currency or other negotiable and nonnegotiable instruments or contracts representing either Money or property. b. Securities mean negotiable and non-negotiable instruments or contracts representing either Money or property. c. Social Engineering Incident means the intentional misleading of an Insured to transfer Money to a person, place or account beyond the Named Insured's control resulting directly from the Named Insured's employee's good faith reliance upon an instruction transmitted via email, purporting to be from: i. a natural person or entity who exchanges, or is under contract to exchange, goods or services with the Named Insured for a fee (other than a financial institution, asset manager, broker-dealer, armored motor vehicle “named insured” or any similar entity); or ii. an employee of the Named Insured; but which contained a fraudulent and material misrepresentation and was sent by an imposter. As a condition precedent to coverage, the Insured's established and documented verification procedure must have been followed before acting upon such instruction.
Social Engineering. 4 days 1. Define steps hackers take in an attack 2. Define and explore social engineering as the human risk Activities: (G or L) 7 Steps of an Attack – sorting, (L) CS Interactive: Social Engineering (G) Make a Social Engineering PSA video, (L) Social Engineering Toolkit on Ubuntu NJ Standards: 8.1.12.NI.3, 8.1.12.IC.1
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!