70 likes | 94 Views
Investing in your employees and yourself on raising the level of Cyber security Awareness will be beneficial all around! Companies and organizations should start focusing on improving the security of their human factor.VisitUs:- https://bit.ly/3BIO252
E N D
Social Engineering, It’s tactics and Prevention Social engineers have found numerous approaches to exploit victims of their personal information. With the continuous increase of new cyber threats, society should be constantly informed and educated on how to distinguish and prevent them. Due to the direct interaction with the human user, social engineering is one of the most powerful methods of network penetration.
What is Social Engineering? Social Engineering is a type of psychological manipulation that’s used to lure people into giving away personal information or to do certain acts. These criminals conduct their attacks through SMS, phone calls, emails and social media. Social Engineering depends on human interaction, which means the success and failure of the attack relies on the intended victim.
Stages of Social Engineering When a social engineer is set on a new victim, they begin to research about the person to find every detail that could be used to their advantage. Research After they gathered enough information, they start planning how to carry out their attack either by email, phone call, SMS or through social media. Planning
Commonly Used Tactics This technique is when the attacker creates a narrative which is a series of lies to tell the victim. The story is created after the attacker accumulates information about the individual. Pretexting Is when the attacker is seeking entry to a restricted area, where access is unattended or controlled by electronic access control, they can simply walk in behind a person who has legitimate access. Tailgating
Conclusion When receiving an email or a call, nothing is predictable. You will always be exposed to many kinds of attacks, but being aware of them will give you an upper hand. With social engineers, the best way to avoid being tricked by them is to able to distinguish their tactics. Cybersecurity threats will continue to evolve, but its users who should be a step ahead and take the necessary precautions. Contact us +966 112931501 Hala@cerebra.sa Riyadh, Saudi Arabia, King Fahad Road, Riyadh Gallery - 2nd Floor, Office 202 www.cerebra.sa