Direct Technology Group Blog

Direct Technology Group provides professional IT Support and Network Services for Businesses around South Florida. Computer Services, Tech Support, IT Solutions and more!

Why Social Engineering Needs to Be on Your Radar

As prevalent as cybersecurity threats unfortunately are today, many users tend to overlook major threats that they just aren’t focused on nearly as much: social engineering attacks. Social engineering attacks are just another means for a cybercriminal to reach their desired ends, and so need to be protected against.

Let’s examine how social engineering is shaped, and why it can be such an effective method for hackers to use.

What is Social Engineering?

While the term is now most closely associated with cybercrime, the basic concept behind social engineering is using one’s perceived influence (whether that perception is accurate or not) to lead another person into making decisions that are to your benefit.

Take a moment and think of some of the cyberattacks you’ve seen in film and television. With very few exceptions, they either are carried out through a direct attack where the cybercriminal types in some code and disables the target’s defenses, or the cybercriminal puts on a disguise to infiltrate the business itself. Of the two, the latter is closer to the social engineering approach, but it is not unheard of for an attack to utilize aspects of both (granted, films and television drastically oversimplify how this works).

For our purposes, social engineering is the term used to describe when someone uses the fundamentals of human psychology to gain unauthorized access to a business and its data. Rather than exploiting a vulnerability within a system’s technology, a social engineer will take advantage of the people working with the technology to gain access through relatively simple psychology.

This can be accomplished through a few different means, each classifiable under a different banner: user carelessness, perceived helpfulness, fear tactics, and working within a comfort zone. What follows is a review of these banners and some of the strategies that a social engineering cybercriminal will use as a part of each. We will also go over a few best practices that can help prevent a social engineer’s success.

User Carelessness

It is not uncommon for a scammer looking to leverage social engineering to rely on the oversights of a business’ end users in order to gain some information. Some of the things that may be thrown out without a second thought could very easily cause a security leak, so it doesn’t hurt to keep a shredder readily available in the office. If a scammer has managed to get into your building itself, they might not even have to bother dumpster diving, especially if your users have their passwords recorded on sticky notes and pasted to their monitors. This is precisely why you should never keep your passwords written down somewhere, regardless of how much you trust your coworkers or employees.

Perceived Helpfulness

People are social creatures, which is why it is (for the most part) our instinct to lend someone a hand if we see they need help. This impulse has contributed to cybercriminals taking advantage of their victims in order to advance their schemes. How often do you see someone holding a door for a perfect stranger if they are carrying something, or even if they are walking closely enough? Many times, this tendency has allowed cybercriminals to gain the access they need to execute their attack thanks to an unwitting employee. This can even happen after emergency evacuation drills, as the high volume of traffic allows a cybercriminal to pass through relatively unnoticed. Otherwise, scammers will frequently call up the organization, ask to be connected to IT, and (posing as a user whose name they found on LinkedIn or by searching through the trash) ask to have their credentials reset. While the natural inclination to be helpful can make it difficult, resist offering this kind of help unless you can confirm the person to be trustworthy.

Working Within the Comfort Zone

When we think about hackers, one of the most common features that our imaginations likely share is the “fact” that the cybercriminal is operating at a distance. Unfortunately, this isn’t always the case, as a key social engineering tactic is to conduct an attack right under someone’s nose. A clever cybercriminal might gain access to a large enough business by loitering around where employees take their smoke breaks, gaining access to the building by simply following the group back into the office. Alternatively, some of the more theatrical scammers may actually dress up as a maintenance worker or some other vendor to gain access, where they can then peek at your employees’ screens or steal data from trash cans.

Unfortunately, this technically would also include insider threats, where your employees intentionally cause data breaches and leaks.

Fear Tactics

Finally, fear has long been known to be a powerful motivator, so it really is no surprise that cybercriminals would resort to this means to coerce their targets into compliance. This tactic is what gives phishing such a nasty bite, along with many other guerilla forms of cyberattack. Striking fast, and threatening severe consequences if the target doesn’t do exactly what they are told, the cybercriminal can create a very convincing narrative that an end user unfamiliar with the warning signs of such attacks could easily fall for.

We Can Help Protect Your Business

From improved authentication methods to upped awareness to improved security solutions, Direct Technology Group can help you secure your business from unwanted intrusions. To find out more about what we offer, reach out to us at 954-739-4700.

Tip of the Week: Properly Cleaning Your Laptop
Shadow IT Is a Problem, or Is It?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 17 February 2020

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Business Computing Cloud Google Efficiency Hackers Microsoft Malware Network Security Data Innovation Software Smartphones User Tips Miscellaneous Productivity Email Business Backup Hardware Mobile Devices Computer communications Android Hosted Solutions Internet Workplace Tips Productivity Communication Smartphone VoIP Windows Business Management Small Business Ransomware Windows 10 Cybersecurity Upgrade Browser Managed IT Services Social Media Outsourced IT Tech Term IT Support Network Passwords Mobile Device Employer-Employee Relationship IT Services Bandwidth Microsoft Office Save Money Apps Business Continuity Users Holiday Windows 10 Automation Collaboration Facebook Managed IT Services Office Marketing Chrome Cloud Computing Gadgets Data Backup Internet of Things Quick Tips Gmail IT Support Wi-Fi Mobile Device Management Networking Disaster Recovery Wireless Server Apple Router Alert Applications Data Recovery Password Computers Information Managed Service Provider Retail Business Intelligence Hacking Virtualization App VPN Phishing Managed Service Office Tips Mobility Access Control Health Remote Computing Settings Data Management Blockchain Patch Management Analytics BYOD Laptop Application Physical Security Office 365 Saving Money Remote Monitoring Cybercrime Government Website Excel Law Enforcement Operating System iPhone Bring Your Own Device Spam Value Entertainment Going Green Telephone Systems WiFi Biometrics Twitter BDR History Word Big Data Mouse Google Drive Safety Workers Virus VoIP Paperless Office Social Engineering Recovery Politics Managed IT Service Compliance Environment Maintenance Data Breach Humor Artificial Intelligence Battery Mobile Computing Lithium-ion battery Tablet Current Events Shortcut Search Batteries Social Network Telephone System Hosted Solution Mobile Office Wireless Charging Dark Web Human Resources Cleaning Tip of the week Payment Cards DDoS Robot Hard Drives Tech Support IT solutions Virtual Assistant Windows 7 Customer Relationship Management Data Protection HIPAA Shadow IT Risk Management How To Hybrid Cloud Tech Terms Remote Monitoring and Management Customer Service Internet Exlporer Sports RAM Cost Management PowerPoint Streaming Media Fax Server Net Neutrality The Internet of Things Information Technology Employee-Employer Relationship Two-factor Authentication Business Technology Vulnerability Processor Healthcare Company Culture Scam Cortana Telephony Smart Technology Printer Data Security eWaste G Suite Printer Server Files User Error Managing Stress Data storage Best Practice Medical IT Connectivity End of Support Voice over Internet Protocol Copy Monitor Hard Disk Drive Staff GDPR Access Comparison disposal People Online Shopping Downloads Bloatware Internet exploMicrosoft Eliminating Downtime instant Messaging Profiles Running Cable Edge Antivirus Techology Phone System Paste Reputation Video Uninterrupted Power Supply Websites Storage Printers Specifications Distribution Trends User Entrepreneur Google Maps Advertising Bitcoin Wireless Internet Vulnerabilities Amazon Social Networking Education HaaS Tablets Spotify Customer OneNote Dongle Error Conferencing Help Desk Fleet Management Meetings Lead Generation A.I. Private Cloud Cryptocurrency IT budget Plug-In Personal Information Remote Support Flexibility Hiring/Firing Content Filtering Database Cabling Remote Control Windows Server 2008 R2 Touchscreen Certification Multi-Factor Authentication Movies Bluetooth Botnet Public Cloud Threats Staffing Touchpad Distributed Denial of Service IT Management Proactive IT SaaS Legal User Tip Tactics Memory Spam Blocking Taskbar Technology Tips Microsoft Office 365 Budget Training Holidays WannaCry Unified Communications USB Managed IT Scams Time Management File Sharing Telecommuting Internet Explorer Windows XP Email Management Relocation National Security Backup and Disaster Recovery Authentication Security Cameras Virtual Private Network Hard Drive Programming PDF Project Management Video Games Chrome OS Network Attached Storage Analysis User Security Millennials Threat Consultant Computer Accessories Updates SSD Authorization Wearables Co-Managed IT SharePoint Processors Microsoft Teams Licensing Insurance Gadget Black Market Encryption Server Management Printing Best Available Analyitcs Webcam Cameras Inventory Troubleshooting YouTube Memes Spyware Travel Hacker Alerts Electronic Health Records Notifications Machine Learning Worker Paper Display Mobile Security Update File Management NarrowBand IT HP Live Streaming WIndows 7 Science Work/Life Balance Unified Threat Management Downtime Employees Telecommute Reporting Sales Voice over IP Ink Avoiding Downtime Multi-Factor Security Benchmarks e-waste Outlook Managed Services Provider Windows Media Player Wireless Technology E-Commerce Hosted Desktop Document Management Cables Automobile WhatsApp Windows 8 Solid State Drive Data loss Knowledge eCommerce Virtual Reality Recycling Profitability Vendor Chromecast Payment Firewall Wearable Technology Digital Social News