Free Cybersecurity and GRC awareness content. For adults.
Content – Social Engineering and Incidents
Below you’ll find the content for ‘Social Engineering and Incidents’ – this covers social engineering attacks such as phishing and vishing, and also deals with incidents and incident response.
To download, simply click on the image to get the full size version and then right-click and select ‘Save Image as’
Data Breach Kitten
Everyone wants one…
Tech support
You are doomed to like me
How to I declare an incident again?
I heard we had a security guy…
Pandas
Not always safe for kids
Predator and Prey
Most delicious.
Objection!
Ok it’s mostly my fault…
My Anti-phishing strategy
Works like a charm.
This small bear is so cute.
This big bear is… OMG that’s a big bear
I have a business proposal for you
I know it makes no sense, but listen.
Oh that scam again
Your friend is still stuck in an airport?
An incident? Time to panic!
Well… we COULD follow the procedure.
What’s soft, fluffy and good for stress levels
Sheep rhymes with data breach right?
Do I need to talk to the DPO or the CISO
Um… where does the CISO sit again?
This picture of a dog is so cute
This picture of a dog is so dangerous.
Dancing
A skill every CISO requires…
What goes in the fiery pit of data breach
Stays in the fiery pit… even if you’re cold.
Hey this guy wants to send me free money
I can totally trust him
Do you bitcoin?
Ok but why do you need it?
Incident Response Wizard
If only we all had one…
After an incident
Extreme measures are the best measures…
Root cause fix
The problem will never come back.
Social Engineering
Doesn’t work the same without the internet…
What type of Social Engineer are you?
We’re all good liars
Social Engineering
It’s ok to use a little help…like magic spells.
Social Engineering Champions
They can become anything. Literally!
An Urgent Business Proposal
The Latest Thriller by Scrytap
Good morrow m’lady
Thou hast some phishing in the post
Incident Response Procedures
So what really IS an incident?
Goldfish vs Humans
Which one clicks on more stuff?
Incident Response
This is the best way to quarantine…
What to do in a Cyber Security Incident?
Don’t forget to blame someone…
DIY guide to getting Phished
Flowchart yourself to hell…
I don’t need to check that link
Because I use perfume. Psht! Psht!
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Cookies Policy
Privacy Overview
This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.