WHAT IS SOSIAL ENGINEERING
traditional hacking aims to compromise the security settings of IT systems and applications social engineering attackers attempt to exploit the users of these technologies by claiming to be employees vendors or support personnel to try to trick the workers people are trusting and willing to help others and the attackers use that to their advantage by deceiving users into revealing information that compromises data security traditional protection from malware and viruses will not protect you from a social engineering attack once they gather bits and pieces of the organization they'll be able to put the puzzle together and exploit the business one technique is phishing emails which are typically the most successful form of social engineering this is where hackers will send out emails to their victims in hopes of gaining sensitive information by tricking them into clicking a malicious link giving the hacker access to information another technique is physical breaches this is where the hacker does an impersonation of someone else in order to gain access to a secure location attackers can also use the technique of pretext calling this is where an attacker makes up a scenario to obtain the information they need pretext calling often requires trust to be formed between the attacker and the victim don't be fooled by social engineering tactics be sure to train employees to follow safe security measures in the event of an attack employees should always be cautious when sharing personal information on social media platforms never open an email that looks suspicious or let a stranger connect to your wireless network don't give strangers personal information until you can verify where they are calling from review security policies to stay up to date with the latest social engineering techniques always use a paper shredder to properly dispose of your printed material it is important to treat security awareness and training as an investment for more information on social engineering please visit us at grave accom you
Post a Comment