Welcome to the HII Employee Portal

Search

August 2025 Cybersecurity Highlight: Handling Social Engineering Attacks

In social engineering attacks, urgency is often used as a powerful manipulation tool. When attackers create a sense of time pressure, they aim to bypass rational thinking and push people into hasty decisions.

  • Take a breath: Pause and give yourself time to think.
  • Verify independently: Reach out to the supposed sender through a different, trusted channel.
  • Follow protocols: Don’t bypass established procedures, even under pressure.
  • Ask for guidance: Consult a colleague or supervisor about the request if you are unsure.

As a general rule, remember that legitimate requests rarely require immediate and unrestricted action. When in doubt, it’s better to check than to take hasty actions that you’ll regret later.

Learn more about social engineering, and other ways cyber criminals can attack, in this pdf.

Want to know more? You can find Cybersecurity resources about the following topics below:

Malware

Phish Alert Button (PAB)

Three pillars of Cybersecurity

Strong Passwords

Social Engineering

The Dark Web

Artificial Intelligence 

Maintaining Your Digital Wellbeing

RELATED NEWS