Sources & full URLs
NCSC: Phishing attacks
https://www.ncsc.gov.uk/collection/phishing-scamsNCSC: Suspicious email reporting service (SERS)
https://www.ncsc.gov.uk/collection/phishing-scams/report-scam-emailCISA: Avoiding social engineering and phishing attacks
https://www.cisa.gov/news-events/news/avoiding-social-engineering-and-phishing-attacksFBI IC3: Latest consumer alerts
https://www.ic3.gov/Home/ConsumerAlertsFTC: How to recognize and avoid phishing scams
https://consumer.ftc.gov/articles/how-recognize-and-avoid-phishing-scamsMicrosoft Security: Social engineering attacks
https://www.microsoft.com/en-us/microsoft-365-life-hacks/privacy-and-safety/what-is-social-engineeringGoogle Safety Center: Spot and report phishing emails
https://support.google.com/mail/answer/8253?hl=en-GBAction Fraud UK: Report fraud and cyber crime
https://www.actionfraud.police.uk/reporting-fraud-and-cyber-crimeUS Cybersecurity & Infrastructure Security Agency: Reporting phishing
https://www.cisa.gov/reportHave I Been Pwned: Password reuse guidance
https://haveibeenpwned.com/PasswordsHadnagy, C. (2018). Social Engineering: The Science of Human Hacking.
https://www.wiley.com/en-us/Social+Engineering%3A+The+Science+of+Human+Hacking%2C+2nd+Edition-p-9781119433385Parsons, K., McCormac, A., Butavicius, M., Pattinson, M., & Jerram, C. (2017). The human aspects of information security questionnaire (HAIS-Q).
https://www.sciencedirect.com/science/article/abs/pii/S0167404817300081Workman, M. (2008). Wisecrackers: A theory-grounded investigation of phishing and pretext social engineering threats to information security.
https://onlinelibrary.wiley.com/doi/abs/10.1002/asi.20779?msockid=2e92c401e8246c651764d071e9036d5bCialdini, R. B. (2007). Influence: The Psychology of Persuasion.
https://books.google.co.uk/books/about/Influence.html?id=5dfv0HJ1TEoC&redir_esc=yFurnell, S., & Clarke, N. (2012). Power to the people? The evolving recognition of human aspects of security.
https://www.sciencedirect.com/science/article/abs/pii/S0167404812001228