Slide 1

Recognize the manipulative social engineering techniques that criminals use to access sensitive information. ... It's best to verify with your coworker first by sending a new e-mail. Never click ... you must check the box below to acknowledge that you have read, understood, and will comply with the material covered in this training. ... ................
................