Social engineering as a corruption risk Image “Hello, this is Mariah from your IT department. We are undertaking a remote check of the systems, and I need to verify your password”. In the personal data sphere, this could lead to identity theft; in the private sector, it could result in loss of business or customer trust. But what happens when core government systems are compromised? Gaining access to personal and administrative data captured by core government systems could lead to adding ghost workers to payroll and other registries, redirecting vendor and benefits payments, potentially bilking the government out of millions of dollars.