094 90 48200     Get SUPPORT

Aniar IT Services Blog

Aniar IT Services has been serving the Castlebar area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Would Your Users be Tricked by Social Engineering?

Would Your Users be Tricked by Social Engineering?

The term social engineering may not seem nearly as intimidating as other cybersecurity terms like ransomware or denial of service. Don’t be deceived! Some of the biggest threats to your company’s data and network security use social engineering to manipulate targets into taking a specific action - like disclosing personal information that can be stolen and exploited.

Often overlooked by the media in favor of major data breach events, there are few types of social engineering hacks that have the capability to devastate a business.

  1. Vishing: Given the fact that the number of people who fall for phishing attacks and other email scams has declined significantly, it was only a matter of time before hackers found an alternative avenue to exploit their targets. After abandoning it a few years ago in favor to digital scams, vishing - a fraudulent voice call that seeks personal information - have once again returned as a favorite among hackers and thieves.
  2. HTTPS: SSL certificates used to ensure that a website was legitimate and secure enough to protect your personal information. Websites that have ‘https’ no longer signifies security, as hackers have begun using websites that give away SSL certificates for free and using them to lull victims into a false sense of security. To make sure a website is secure, you’ll want to look for indication of an extended validation SSL (EV-SSL) which are not offered for free! EV-SSLs are signified with a green bar.
  3. Website Copy-Cats: Scammers have become very skilled at making spoof websites that look and feel just like the authentic website but are actually littered with all typesof malware. For example, after the Equifax data loss event in June 2017, Equifax set up a website to help their clients who had their information compromised with the URL: equifaxsecurity2017.com. A spoof of that website, with the domain securityequifax2017.com, was so convincing - it even tricked Equifax themselves! A few things to keep an eye out for when trying to determine if a website is legitimate, include:
    1. Make sure the URL is correct.
    2. Avoid giving out information unless a site has an EV-SSL.
    3. Look for seals of trust from other IT security websites.
    4. Beware of misspellings, typos and broken English.
  4. Every Word Password Theft: There are a lot of hacking tools that will scan through databases - including every word in the dictionary. These tools significantly increase the likelihood that a password that includes an actual word will be cracked and exploited. The best practices are ones that mix numbers, letters and symbols that make no sense.

When it comes to digital threats, for every exploit or hack that is prevented, a few, more advanced ones are developed. The best way to keep your business, and it’s data, safe is to take proactive measures and execute safe internet practices all times - and that goes for your employees, as well! Would you like to learn more about how you can stay ahead of hackers? Call us at Aniar IT Services.

These Smartphones Make an Excellent Gift (Even To ...
Tip of the Week: Using Your Smartphone More Effect...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 19 March 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Privacy Google Email Microsoft Best Practices Business Computing Hackers How To Data Backup Small Business Android Chrome Software Managed IT Services Hardware Cloud Computing Innovation User Tips VoIP Cloud Cybersecurity Network Security Efficiency Collaboration Backup Smartphones Spam Windows 10 Mobile Device Management Two-factor Authentication Malware Windows Browser Vulnerability Business Cybercrime Data Recovery Data Security Computers Communication Data Storage Business Intelligence VPN Business Continuity Communications Redundancy Office 365 IT Management Remote Monitoring App Saving Money Word Ransomware Mobile Devices IT Plan Spam Blocking OneNote Money Data Unsupported Software Operating System Apps Update Smartphone Outsourced IT Managed IT services Data Protection Bring Your Own Device Business Management Telephone Systems Social Engineering Virtualization Avoiding Downtime BYOD Phishing Internet of Things Comparison CES Passwords Artificial Intelligence HaaS Infrastructure Scam Content Management HBO IT Support Amazon Computer Fan Password Microsoft Office Blockchain Network IT Services Disaster Recovery Outlook Amazon Web Services FENG Government Accountants Password Manager Voice over Internet Protocol Website Tools HIPAA Work/Life Balance Frequently Asked Questions Settings Holiday Recovery Sync Business Mangement Meetings Multi-Factor Security Windows 10s Electronic Medical Records Google Drive Millennials Excel Online Shopping Gmail Facebook Router Private Cloud Value Data Management Workforce Tip of the week Evernote Telephony Recycling Trending BDR Public Cloud Managed IT Human Resources Windows Server 2008 Keyboard eWaste Data loss The Internet of Things Telecommuting Gadgets Botnet Staff Software Tips Windows 7 Charger Computer Care Skype Legal Alert Big Data Employer-Employee Relationship Remote Work Travel Patch Management Wireless Charging Upgrade Start Menu Criminal Identity Theft Solid State Drive Social Media Digital Signature Google Apps Downtime Screen Mirroring Physical Security Server Credit Cards Audit Internet PDF Google Docs Flash Workers Root Cause Analysis Wi-Fi Computer Law Enforcement Cast Specifications Cortana Fraud Encryption 5G Wireless Technology IBM Managed Service Provider Hacker Marketing Customer Relationship Management Emergency IP Address Customer Service Mobile Office Domains Hard Drives Public Speaking Hosted Solutions Lithium-ion battery Augmented Reality Tech Support Safety Productivity Budget Hiring/Firing CrashOverride Competition Fun Users Miscellaneous WiFi Wireless Windows 10 Search Presentation