RESILIA: Social engineering – one born every click

Graphic depicting silhouette of man operating mobile device with the caption 'one born every click' superimoposed

What’s there to fear from people contacting your organization purporting to be someone from a supplier with a change to company payment details?

The problem is knowing whether that person is who they claim to be, or someone using sophisticated social engineering techniques to trick unsuspecting employees into making fraudulent payments.

In our latest, fictitious audio story, a conversation between two people who’ve met through a dating site is not what it seems: “Abi” is indulging in what appears to be harmless banter with “Price” about the usual dating topics but then the conversation takes a turn when Abi turns out to be a “fan” of Price and starts flattering him with compliments on his notoriety. But little does Price know Abi’s endgame…

Social engineering is a critical business risk and anyone in an organization who has some form of social media profile is vulnerable to a social engineer.

So how does an organization – whose critical data and information could be placed at risk from a real-life social engineer – help its employees to acknowledge these risks and to understand what they need to do to reduce them?

By using stories to illustrate risks, we help people to visualise and understand the daily threats from cyber criminals – including those using social engineering tactics. As a provider of GCHQ Certified training (GCT), RESILIA® Frontline cyber security and data protection training uses stories and scenarios to bring these very real cyber threats to life.

Learn more about the power of storytelling in cyber security awareness training.

We would love to show you!

You can also request a free live demonstration of RESILIA Frontline at a time that suits you by visiting

Make your people your greatest defence against cyber attacks with RESILIA Frontline!

*Abi-Linda MacManaman, Bill, Daisy, Kyle, John Holden, Sarah and Price/Pryce Baily are all fictitious names used for the purpose of this fictitious story only. Any similarity to a real person is not intended nor should it be inferred.

Read more AXELOS Blog Posts in our Power of Storytelling series

RESILIA: Personal Information – Lily’s amazing birthday cake

RESILIA: Social Media Protection: One Nil to the Hackers

RESILIA: Online Safety – Fine Margins - a RESILIA® Frontline audio story

‘Phishing: Speared’ a RESILIA® Frontline audio story

'BYOD: Too Shiny. Too Easy' – a RESILIA® Frontline audio story

Current rating: 4 (3 ratings)


There are no comments posted.
You must log in to post a comment. Log in