At this point, you surely have heard about of social engineering in terms of information security. However, we invite you to go in depth in this post on the practices that put you at risk, and some tips to avoid them.
Know the risks and threats of social engineering on your assets and sensitive data
From Phishing to Whaling: Recognizing and Avoiding Identity Theft
Phishing has naturally completed its run, but identity theft has also naturally evolved towards whaling. Click here to know its traits, and how to stop it.