This alert may not be shared outside your organization, Do Not Repost or send, place on other websites, List servers, or send to others via email, including other associations or parties. Members and Law enforcement use only. Contact us for any permissions. To do otherwise will result in the loss of membership.
What Is an Impersonation Attack? How You Can Stop Imposters
Make Use Of
There's an email in your inbox from someone you know. The sender asks you for sensitive information and you send it without any hesitation because you trust them. Shortly after, you realize that the information has been exposed or used to compromise an account.
You reach out to the sender only to realize they never requested such information from you. You have just been a victim of an impersonation attack. To avoid the above scenario, learn how an impersonation attack works, its various types, and how to prevent it.