The CompTIA Tech+ Study Guide discusses social engineering prevention:
“Social engineering relies on manipulating people rather than technology. The best protection against social engineering is user awareness and verifying identity before sharing information.”
Verifying a user’s identity via a phone call before taking any action (such as password reset or data access) is an essential safeguard against impersonation attempts.
Verified Reference:
Chapter 11: Security Best Practices — “Recognizing Social Engineering and Phishing Attacks” (pp. 586–588).
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit