The act of manipulating people into performing actions or divulging confidential information is known as social engineering.
There are many forms of social engineering, and you need to be on your guard. People may attempt to collect personal information from you, or to relieve you of your IT equipment.
Points to note include;
- Shoulder surfing. Ensure that you cannot be overlooked entering your password, PIN number etc.
- Unsolicited telephone calls. Are they genuine?
- Does that person you’ve held the door open for really work in that restricted area?
- Does the person that has just walked away with your IT equipment for fixing really work in IT?
Just a moment questioning may save you expense and embarrassment. If you would like to discuss your IT security queries then contact the University IT Security Officer at firstname.lastname@example.org