Your preference has been saved. Remove your saved preference.
You must supply both a username and a password to login.
You must supply a username, password and token to login.
Sign on
Passport secured login icon  
Wealth Management
Asset Management
Asset Servicing
Insights & Research
About Northern Trust
Search go
Click to close drop down menu.
Click to close drop down menu.
Financial Intermediary
Learn about asset management solutions designed for Retirement Plan Advisors, TAMPs/Outsourcing Providers, Subadvisory Program Sponsors, RIAs/Financial Advisors and Trust Institutions.
Learn about asset management solutions including: global index management, active equity and fixed income, target retirement date funds, and manager of manager programs.
Get answers to your investment challenges with asset management capabilities including alternatives, exchange traded funds, fixed income, mutual funds and tax-advantaged equity.
Click to close drop down menu.
Northern Trust Logo

Social Engineering


Social Engineering is a term used to describe a collection of techniques used to manipulate people into divulging confidential information.  Social Engineers target humans – and often portray themselves as people in need of your help or people of authority in order to gain access to information they are not authorized to receive.

Social Engineering can occur via computers, phone calls, text messages, and even in-person. Protecting yourself against Social Engineering attacks is easier if you know the signs to watch for.

Types of Social Engineering Attacks:

  • Spoofed Websites
  • Social Media Fraud
  • Phishing/Spear Phishing
  • Smishing (fraud perpetrated through text messages)
  • Telephone Fraud

Remember, Social Engineers are clever and confident and seldom make mistakes.  They will appear to know just enough facts to SEEM legitimate, but are actually attempting to gain information for illicit purposes. To help reduce your risk of becoming a victim of Social Engineers:

  1. Always know with whom you are sharing your personal information;
  2. Discard your personal physical information securely;
  3. Ask questions and verify the information before you release any personal or financial information;
  4. Maintain appropriate security on your computers and mobile devices (anti-virus, anti-spyware, passwords, and personal firewalls);
  5. Beware of suspicious calls, e-mails, and general solicitations asking for money; do not wire money in response to a solicitation.

Learn More