ct logo wslogan

2 minutes reading time (496 words)

Would Your Users be Tricked by Social Engineering?

Would Your Users be Tricked by Social Engineering?

The term social engineering may not seem nearly as intimidating as other cybersecurity terms like ransomware or denial of service. Don’t be deceived! Some of the biggest threats to your company’s data and network security use social engineering to manipulate targets into taking a specific action - like disclosing personal information that can be stolen and exploited.

Often overlooked by the media in favor of major data breach events, there are few types of social engineering hacks that have the capability to devastate a business.

  1. Vishing: Given the fact that the number of people who fall for phishing attacks and other email scams has declined significantly, it was only a matter of time before hackers found an alternative avenue to exploit their targets. After abandoning it a few years ago in favor to digital scams, vishing - a fraudulent voice call that seeks personal information - have once again returned as a favorite among hackers and thieves.
  2. HTTPS: SSL certificates used to ensure that a website was legitimate and secure enough to protect your personal information. Websites that have ‘https’ no longer signifies security, as hackers have begun using websites that give away SSL certificates for free and using them to lull victims into a false sense of security. To make sure a website is secure, you’ll want to look for indication of an extended validation SSL (EV-SSL) which are not offered for free! EV-SSLs are signified with a green bar.
  3. Website Copy-Cats: Scammers have become very skilled at making spoof websites that look and feel just like the authentic website but are actually littered with all typesof malware. For example, after the Equifax data loss event in June 2017, Equifax set up a website to help their clients who had their information compromised with the URL: equifaxsecurity2017.com. A spoof of that website, with the domain securityequifax2017.com, was so convincing - it even tricked Equifax themselves! A few things to keep an eye out for when trying to determine if a website is legitimate, include:
    1. Make sure the URL is correct.
    2. Avoid giving out information unless a site has an EV-SSL.
    3. Look for seals of trust from other IT security websites.
    4. Beware of misspellings, typos and broken English.
  4. Every Word Password Theft: There are a lot of hacking tools that will scan through databases - including every word in the dictionary. These tools significantly increase the likelihood that a password that includes an actual word will be cracked and exploited. The best practices are ones that mix numbers, letters and symbols that make no sense.

When it comes to digital threats, for every exploit or hack that is prevented, a few, more advanced ones are developed. The best way to keep your business, and it’s data, safe is to take proactive measures and execute safe internet practices all times - and that goes for your employees, as well! Would you like to learn more about how you can stay ahead of hackers? Call us at i-medIT.



Already Registered? Login Here
No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Google Cloud Business Computing Hackers Backup Microsoft Malware Innovation Email Internet Tech Term Android Network Security Mobile Devices Cybercrime Data Small Business VoIP Hardware Cloud Computing Windows Business Data Backup Software Ransomware Efficiency Smartphones Smartphone User Tips Internet of Things Computers Business Management How To Browser Cybersecurity Collaboration Automation Artificial Intelligence Computer Money Router Data Recovery Communication Managed IT Services Business Continuity Law Enforcement Productivity Mobile Device Management Social Engineering Communications Hosted Solutions Chrome Upgrade Network Disaster Recovery Managed IT Services Connectivity Save Money Safety Windows 10 Word Vulnerability Bring Your Own Device Data Security Gadgets Operating System Two-factor Authentication Social Media Alert Bandwidth Phishing Saving Money Telephone Systems Office 365 App Server Outsourced IT BDR Data Protection Data Breach Spam BYOD Avoiding Downtime Data storage Data Storage Paperless Office Comparison IT Support Physical Security Website Blockchain Networking Passwords Cleaning IT Management Private Cloud Sports Password Government Gmail Google Drive Downtime Identity Theft YouTube Remote Monitoring OneNote IT Plan Public Cloud Windows 10 Managed IT Business Intelligence Facebook Recovery Windows 7 Applications Productivity Virtualization The Internet of Things Update Miscellaneous Unsupported Software VPN Infrastructure Wi-Fi Microsoft Office IT Services Quick Tips CES Apps Spam Blocking Internet Exlporer Redundancy Content Management Smart Tech webinar Flexibility Business Mangement HVAC FENG Managed Service Provider Office Tips Excel Telecommuting Hosted Computing Current Events Advertising Tools Google Apps Computer Care Windows 10s Relocation DDoS Sync Amazon Web Services Hiring/Firing Cache Wireless Technology Digital Signature Virtual Assistant Meetings Conferencing Recycling Enterprise Content Management Tip of the week Remote Work Inventory Knowledge Outlook Employer-Employee Relationship Samsung Machine Learning Specifications Patch Management Automobile Online Shopping Wireless Internet Workplace Tips Voice over Internet Protocol USB HIPAA Encryption IBM Telephone System User Error Windows Server 2008 Devices Emails Legal eWaste Password Management Health Tech Support Access Control Network Congestion Humor Workers Value Solid State Drive Scam Telephony Work/Life Balance Evernote Wire Settings Human Resources Accountants Supercomputer Robot Data loss Credit Cards Thought Leadership Reputation Keyboard Criminal NIST Shadow IT Authentication IT Consultant Hybrid Cloud HaaS Botnet Entertainment Laptop Audit Apple HBO Millennials Skype Wireless Charging Smart Office Chromecast Multi-Factor Security Big Data Staff Budget Screen Mirroring End of Support Flash Fraud Electronic Medical Records Customer Mobile Device Cryptocurrency Root Cause Analysis Files Nanotechnology Monitor Software Tips PDF Travel Holiday Password Manager Servers Touchpad Computer Fan iPhone Uninterrupted Power Supply Going Green Frequently Asked Questions Workforce Internet exploMicrosoft Start Menu Cortana Charger Document Management Office Trending Practices Cast Amazon Addiction Netflix Hacking Marketing Data Management NarrowBand Google Docs Safe Mode Black Market History Information Technology Battery Firewall Emergency Thank You Worker Commute Worker Scalability Wearable Technology Smart Technology Mobility Risk Management Assessment Education Content Search Congratulations Employer Employee Relationship Rootkit Computing Infrastructure Two Factor Authentication Politics Television Techology Audiobook Company Culture How to Computer Accessories Training Instant Messaging Troubleshooting Webinar Wireless Best Practice Public Computer CrashOverride Loyalty Managing Stress Transportation Vendor Management Users Bluetooth Twitter IT solutions WiFi Experience Remote Computing IT Support SaaS Benefits Books Virtual Reality Save Time Video Games Music