1 / 5

How To Guard Your Company Against Social Engineering Attacks

Successful attacks frequently feature the following elements: A request made from some kind of authority (in this case my bank), the request is something thatu2019s reasonable or in line with what you usually do (or should do at least), and complying with the request doesnu2019t seem all that risky. Follow Us : https://triskelelabs.com

Download Presentation

How To Guard Your Company Against Social Engineering Attacks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. How To Guard Your Company Against Social Engineering Attacks - Triskele Labs Social engineering attacks are a form of manipulation for personal gains Read our blog post to learn how to protect your company against such attacks Recently, I’ve seen a spike in offers coming through to my personal email. Pizza Hut, Woolies, and even EB Games - everyone seems to have something for me! While I was sorting through all of this the other day, I came across a message from a bank I maintain an account in. On the surface, everything seemed fine. They were conducting routine maintenance and the email said they would be updating their systems that week. Where things got a little suspicious was when they asked if I could send across the username and password to my online banking account for “maintenance”.

  2. To demonstrate that they were legit, they used a couple of personal details about me, which could have easily been found through a thorough Google search. This is not the first time I’ve received emails like this and it certainly won’t be the last. While I’m not surprised phishing is on the rise, it’s always a surreal moment to see emails like this come through because truth be told, if I was not a part of the security sector, would they be so easy to spot? According to data from 2018, approximately 62% of businesses experienced phishing and social engineering attacks that year. While the cybersecurity defences available to us are only becoming more sophisticated, this is the same in reverse - cybercriminals, similarly, are more ruthless and have access to more powerful tools and data. Social engineering attacks are largely successful because of their human element - social engineers leverage their knowledge of specific people and use psychological manipulation to make sure their target does what they want. Successful attacks frequently feature the following elements: A request made from some kind of authority (in this case my bank), the request is something that’s reasonable or in line with what you usually do (or should do at least), and complying with the request doesn’t seem all that risky. Now that you have a basic understanding of what social engineering is, let’s take a look at how you can guard your company against these types of attacks.

  3. Train Your Employees To Detect Social Engineering Attacks They say knowledge is power and when it comes to social engineering, this is absolutely true. After all, without knowing what you need to be cautious about, you won’t really be able to see a social engineering attack coming - even from a mile away. Simply explaining what a social engineering attack is won’t do. You need to demonstrate the many guises it can take and what kind of requests come through. Another important element you need to make sure you’re covering is the importance of verification or authentication. Train employees to, first, check, then respond, when unusual requests come in. The worst that could happen is they spend a little time confirming that requests for information are legitimate and are warranted. Make Sure Company Information Isn’t Easily Accessible Commonly known as tailgating and piggybacking, these are techniques social engineers use to get inside your office and steal information through low-hanging fruit - like an office bulletin board, for instance. Using public knowledge in an office setting like meeting times, employee names, and other confidential data, cybercriminals have no problem crafting the perfect email - one that gets you to divulge protected information.

  4. How do they get their hands on this information in the first place? Great question. These people usually enter the office under false pretexts, including helping you out with something you may be carrying. Keep Your Security Software Up-To-Date Another easy way to defend yourself against social engineering attacks is by making sure your anti-virus software, email filters, firewalls and other security software is up-to-date. Social engineering attacks like phishing frequently try and get you to visit a malicious website or download malware, which can be prevented if your security tools are doing what they’re supposed to. Speak to a security expert if you’re not sure which applications will work best for you. In this process, it’s important that you choose the right types and the right versions of given cybersecurity software. Guard Your Company Against Social Engineering Attacks With The Support Of A Security Team Social engineering attacks are on the rise. Unlike at any point in the past, they represent a major threat and if successful, can lead to very damaging consequences for your business - both financially and in terms of your reputation.

  5. I’ve realised that most people are aware of these risks but don’t know how they can defend themselves against these. Fortunately, you can avail yourself of cutting-edge social engineering security support by speaking to our team of experts at Triskele Labs.

More Related