Introduction

Objectives

Threats and Red Flags

Password and Username Phished

Social Media Sharing

Fake Profiles

Pretexting

Disinformation

Tailgating