Skip to Main Content
It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results.

Digital Identity and Privacy

Social Engineering

Using people to gain access to a location or system.  This often entails the intruder pretending to be someone that they are not in order to get access or information that is not usually available. 

Phishing is a common type of social engineering. 


E-mail or phone calls designed to appear legitimate in order to gain personal information or access to your system.