Would Your Users Fall For These Social Engineering Schemes?

Would Your Users Fall For These Social Engineering Schemes?

Social engineering is one of the trickiest parts of protecting your organization. It might sound like something out of a science fiction flick, but it’s one of the most dangerous attacks that a hacker can use against your business. Social engineering attempts to manipulate the target into giving away sensitive credentials or personal information for the purpose of stealing identities and other malicious intentions.

Here are some of the most popular social engineering hacks that you’ll have to watch out for in the business world.

  • Vishing: More people are aware of phishing attacks than ever before, so naturally hackers had to pick up the slack somehow. Vishing is the alternative option that they are now trying to use, which features a voicemail asking for personal information.
  • HTTPS: SSL certificates can make sure that users are aware of whether or not a website is secure enough to protect your personal information. However, HTTPS doesn’t necessarily mean that a website is using security. Hackers can lure in victims by providing “free” SSL certificates to organizations, providing them with a false sense of security. You need to find proof that the website using SSL has an extended validation (EV-SSL), which is not offered for free at all. You’ll see a green bar in the URL bar when this type of encryption is available.
  • Website Copycats: Some scammers have even gone so far as to make websites that look exactly like reputable sites that are designed to harvest credentials or infect computers with malware. One example of this is the Equifax data loss incident which occurred in June 2017. Equifax had set up a website to help clients who had their information stolen, which used the URL equifaxsecurity2017.com. However, hackers capitalized on this event and created a spoof website using the domain securityequifax2017.com. The result tricked Equifax themselves. Here are some tips to help you avoid these spoofed websites:
    • Make sure the URL is correct
    • Don’t give information to sites that aren’t using EV-SSL
    • Look for seals of trust from reputable IT security websites
    • Be on the lookout for spelling errors, typos, or broken English
  • Every Word Password Theft: Hacking tools have certainly developed into more sophisticated threats, going so far as to utilize every single word in the dictionary to crack passwords. These password crackers can create hundreds of thousands of credentials in a matter of minutes, all using a dictionary attack against unwary users. Therefore, the best approach to creating strong passwords is to use numbers, letters, and symbols to make a mixture that nobody would expect.

Online threats can be a considerable problem for your organization, especially when they use each and every exploit against you. Thankfully, with some proactive measures that can keep your business safe, you’ll have a much easier time going about your online duties without exposing your data to threats. To learn more about how to protect your business, reach out to us at (617) 375-9100.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 18 March 2018

Captcha Image

Request a Free Consultation

  • Company name *
  • First Name *
  • Last Name *
  • Title
  • Phone
  • What are your concerns?

      Sign up for our Newsletter!

      • Company *
      • First Name *
      • Last Name *

          Mobile? Grab this Article!

          QR-Code dieser Seite

          Tag Cloud

          security Tip of the Week technology Privacy Best Practices Cloud Hackers Business Computing Productivity business Malware Microsoft Internet IT Services Backup IT Support Hosted Solutions Managed Service Provider Email Network Mobile Devices Workplace Tips Communication Hardware Smartphones Disaster Recovery Computer Mobile Device Management Microsoft Office Holiday Windows Miscellaneous network security Efficiency Software Data Windows 10 Business Continuity Small Business Smartphone Server Google Alert Virtualization Internet of Things Upgrade Saving Money Business Management User Tips Remote Monitoring Innovation Ransomware Social Media WiFi VoIP Passwords Remote Computing Operating System Big Data Android Gmail Cybersecurity BYOD App Mobile Computing The Internet of Things Office Browser Apps Apple Spam Vendor Management Wireless Technology Facebook Collaboration Information Technology Budget Artificial Intelligence Business Growth Risk Management Hacking Phishing Analytics Bring Your Own Device Office 365 IT Solutions Managed IT Services Cybercrime Customer Service Automation Save Money Hacker Going Green Robot Money Cost Management Outsourced IT Office Tips Gadgets Data Management Retail Best Practice Tech Support Mobile Device Hosted Solution Maintenance Social Engineering IT service Bitcoin Laptop communications Two-factor Authentication Data storage VPN IT Consultant Recovery Health Saving Time Hard Drives Cortana Outlook Employer-Employee Relationship Application Presentation Content Filtering Firewall Document Management Downtime Computers Lithium-ion Battery Running Cable End of Support Antivirus Customer Relationship Management virus Website Proactive IT Current Events intranet Avoiding Downtime Managed IT Websites Specifications Data Security Disaster Productivity User Mobile Technology Google Docs project management Augmented Reality Phone System Piracy Hacks Marketing Chrome USB Data Breach Work/Life Balance Data Recovery Social PowerPoint Samsung Statistics LiFi Update Law Enforcement Windows 8 Password Save Time IT Support Private Cloud Excel Tablet Hiring/Firing Quick Tips Blockchain Safety Vulnerabilities Mouse Company Culture Business Owner Encryption Competition Twitter iPhone eWaste Wireless Search Settings Humor Trending Bandwidth Education Cloud Computing Net Neutrality Virtual Desktop Analyitcs Network Congestion Administration Programming Cryptocurrency Google Drive Video Surveillance Halloween Computer Repair Heating/Cooling Windows Server 2008 Access Control Help Desk IBM Crowdsourcing Software License Licensing Router Botnet Scary Stories today ’s world Multi-factor Authentication Windows 7 Hard Drive Disposal Managed Service Providers Virtual Reality Government Redundancy Mobile Payment Touchscreen Sports experience downtime Device security Freedom of Information Unified Threat Management Unified Communications Fun Compliance Patch Management Printing Storage Tech Term Documents News Fiber-Optic Digital Signature Downloads Travel Regulations IT Plan Entrepreneur Comparison Computing Dark Data Crowdfunding Buisness Paperless Office HTML Refrigeration PDF Fake News Fraud data breaches Deep Learning IP Address Google Wallet Gadget Knowledge Migration Television Managed IT Services CIO Data Protection Co-managed IT Microsoft Excel Mobile Office email scam risk Online Currency Drones Politics Experience Business Technology Cyber-attacks Public Cloud User Error cyberattack Identities Black Market Telephony Desktop SharePoint Identity Theft Windows 8.1 Update security breach Undo Printer Tip of the week Computing Infrastructure cyberattacks Debate Solid State Drive Backups Skype Training Applications Word Consumers Distributed Denial of Service Digital Data loss Memory YouTube Modern technology Printer Server Processors Display Vulnerability businesses Alt Codes Mobility Legal LinkedIn File Sharing Mobile Security Users Evernote Virtual Assistant IT Management business owners Domains Environment Notifications Wi-Fi Monitors Networking Software as a Service Typing Best Available Files bdr Flexibility Data Warehousing Hard Drive History Google Calendar People Public Speaking Troubleshooting Telephone Systems 5G Writing Business Cards Business Intelligence Technology Tips Cabling IT Budget UTM CCTV Infrastructure Digital Payment G Suite Point of Sale Uninterrupted Power Supply Google Maps Machine Learning Unified Threat Management SaaS Meetings Hard Disk Drive Software Tips Relocation Physical Security Webcam Motion Sickness Chromebook How To GPS Error Personal Information Cleaning Emoji Upgrades Tracking Corporate Profile Electronic Medical Records Devices Computer Care 3D Printing WannaCry Automobile test post Staffing Unsupported Software Administrator Taxes Data Backup Mobile Data Sync Web Server Supercomputer Value Mobile Device Managment Cameras