• Register

Data Net Blog

Why Social Engineering Needs to Be on Your Radar

Why Social Engineering Needs to Be on Your Radar

As prevalent as cybersecurity threats unfortunately are today, many users tend to overlook major threats that they just aren’t focused on nearly as much: social engineering attacks. Social engineering attacks are just another means for a cybercriminal to reach their desired ends, and so need to be protected against.

Let’s examine how social engineering is shaped, and why it can be such an effective method for hackers to use.

What is Social Engineering?

While the term is now most closely associated with cybercrime, the basic concept behind social engineering is using one’s perceived influence (whether that perception is accurate or not) to lead another person into making decisions that are to your benefit.

Take a moment and think of some of the cyberattacks you’ve seen in film and television. With very few exceptions, they either are carried out through a direct attack where the cybercriminal types in some code and disables the target’s defenses, or the cybercriminal puts on a disguise to infiltrate the business itself. Of the two, the latter is closer to the social engineering approach, but it is not unheard of for an attack to utilize aspects of both (granted, films and television drastically oversimplify how this works).

For our purposes, social engineering is the term used to describe when someone uses the fundamentals of human psychology to gain unauthorized access to a business and its data. Rather than exploiting a vulnerability within a system’s technology, a social engineer will take advantage of the people working with the technology to gain access through relatively simple psychology.

This can be accomplished through a few different means, each classifiable under a different banner: user carelessness, perceived helpfulness, fear tactics, and working within a comfort zone. What follows is a review of these banners and some of the strategies that a social engineering cybercriminal will use as a part of each. We will also go over a few best practices that can help prevent a social engineer’s success.

User Carelessness

It is not uncommon for a scammer looking to leverage social engineering to rely on the oversights of a business’ end users in order to gain some information. Some of the things that may be thrown out without a second thought could very easily cause a security leak, so it doesn’t hurt to keep a shredder readily available in the office. If a scammer has managed to get into your building itself, they might not even have to bother dumpster diving, especially if your users have their passwords recorded on sticky notes and pasted to their monitors. This is precisely why you should never keep your passwords written down somewhere, regardless of how much you trust your coworkers or employees.

Perceived Helpfulness

People are social creatures, which is why it is (for the most part) our instinct to lend someone a hand if we see they need help. This impulse has contributed to cybercriminals taking advantage of their victims in order to advance their schemes. How often do you see someone holding a door for a perfect stranger if they are carrying something, or even if they are walking closely enough? Many times, this tendency has allowed cybercriminals to gain the access they need to execute their attack thanks to an unwitting employee. This can even happen after emergency evacuation drills, as the high volume of traffic allows a cybercriminal to pass through relatively unnoticed. Otherwise, scammers will frequently call up the organization, ask to be connected to IT, and (posing as a user whose name they found on LinkedIn or by searching through the trash) ask to have their credentials reset. While the natural inclination to be helpful can make it difficult, resist offering this kind of help unless you can confirm the person to be trustworthy.

Working Within the Comfort Zone

When we think about hackers, one of the most common features that our imaginations likely share is the “fact” that the cybercriminal is operating at a distance. Unfortunately, this isn’t always the case, as a key social engineering tactic is to conduct an attack right under someone’s nose. A clever cybercriminal might gain access to a large enough business by loitering around where employees take their smoke breaks, gaining access to the building by simply following the group back into the office. Alternatively, some of the more theatrical scammers may actually dress up as a maintenance worker or some other vendor to gain access, where they can then peek at your employees’ screens or steal data from trash cans.

Unfortunately, this technically would also include insider threats, where your employees intentionally cause data breaches and leaks.

Fear Tactics

Finally, fear has long been known to be a powerful motivator, so it really is no surprise that cybercriminals would resort to this means to coerce their targets into compliance. This tactic is what gives phishing such a nasty bite, along with many other guerilla forms of cyberattack. Striking fast, and threatening severe consequences if the target doesn’t do exactly what they are told, the cybercriminal can create a very convincing narrative that an end user unfamiliar with the warning signs of such attacks could easily fall for.

We Can Help Protect Your Business

From improved authentication methods to upped awareness to improved security solutions, Data Net can help you secure your business from unwanted intrusions. To find out more about what we offer, reach out to us at (760) 466-1200.

Tip of the Week: Properly Cleaning Your Laptop
Shadow IT Is a Problem, or Is It?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, February 28, 2020

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Network Security Productivity Data Privacy Smartphones Efficiency Malware IT Support Innovation Hackers Google Email Microsoft User Tips Communication Computer Tech Term Software Managed IT Services Small Business Hardware Communications Mobile Device Users Internet Cybersecurity VoIp Android Cloud Mobile Devices Business Management Outsourced IT Workplace Tips Windows 10 Ransomware Miscellaneous IT Services Business Cloud Computing Collaboration Passwords Social Media Data Backup Apps Wi-Fi Network Browser Hosted Solutions Smartphone Managed Service Holiday Bandwidth Windows Upgrade Data recovery Information Facebook Applications Backup Internet of Things Gadgets Wireless Patch Management Phishing VPN Managed IT services Access Control Blockchain Chrome Microsoft Office Employer-Employee Relationship Gmail Networking Marketing Quick Tips Save Money Laptop Saving Money Router Compliance Value BDR Managed IT Service Business Intelligence Apple Automation Word Remote Monitoring Artificial Intelligence Batteries Password Business Technology Connectivity Employee-Employer Relationship How To Virus Windows 7 Retail Company Culture Telephone System Cortana Physical Security Voice over Internet Protocol Paperless Office Government Remote Computing Business Continuity Wireless Charging Payment Cards Office Virtual Assistant Data Management Social Network Excel G Suite Virtualization Scam Data Breach Going Green Tech Terms Cost Management Office 365 Healthcare Computers Net Neutrality Data Protection Bring Your Own Device Processor RAM Settings Remote Monitoring and Management Data Security Telephony iPhone Medical IT Mobility Hosted Desktop Cryptocurrency Project Management Tip of the week Microsoft Teams Cybercrime Taskbar Education Printing Personal Information HIPAA News A.I. e-waste Hard Disk Drive Multi-Factor Authentication Voice over IP Licensing Dongle Managed Service Provider SaaS Inventory Mobile Managed Services Provider File Sharing Millennials Cables Profitability Document Management Antivirus Training Benchmarks Specifications Backup and Disaster Recovery Firewall Search Machine Learning Tactics Help Desk National Security Knowledge Battery Live Streaming Paper E-Commerce Bitcoin Hard Drive Movies Touchscreen disposal Video Mobile Device Management Tech Support Co-Managed IT Lead Generation GDPR IT Management Mobile Security Electronic Health Records Vendor Eliminating Downtime Staff Security Cameras Risk Management Conferencing Hard Drives Profiles Time Management Insurance Remote Support Managing Stress Ink Payment Processors Cleaning Microsoft Office 365 Server Management Customer Service Holidays eCommerce Alert Vulnerability Maintenance Plug-In Analytics Humor Streaming Media Storage Operating System Health BYOD Digital Websites Wearables SSD Shadow IT Chrome OS File Management Law Enforcement Telecommuting Troubleshooting Telecommute Updates PowerPoint instant Messaging Threats User Tip Spyware Unified Communications Authentication OneNote Sales Online Shopping Internet Explorer Proactive IT Memes Content Filtering Downloads Dark Web Employees Distribution Wireless Internet Safety Virtual Private Network Sports Reporting Computer Repair Current Events Update Data loss Certification Congratulations Server Vulnerabilities Scams Botnet Authorization Database Windows Server 2008 R2 Tablet Travel Threat Big Data Technology Tips IT Recycling WannaCry Trends Error Network Attached Storage Environment Solid State Drive Fleet Management User Security Amazon Edge Customer Relationship Management IT budget Twitter IT Service Human Resources Mobile Office Workers Website Hybrid Cloud Outlook HP Spam Display Comparison WhatsApp Analysis Disaster Recovery WiFi Printers Financial Regulation Thank You

Latest News & Events

Please join us in congratulating Bill Vann on his promotion to Customer Success Manager....

Contact Us

Learn more about what Data Net can do for your business.

Call Us Today
Call us today
(760) 466-1200

5795 Kearny Villa Road
San Diego, California 92123