094 90 48200     Get SUPPORT

Aniar IT Services Blog

Would Your Users be Tricked by Social Engineering?

Would Your Users be Tricked by Social Engineering?

The term social engineering may not seem nearly as intimidating as other cybersecurity terms like ransomware or denial of service. Don’t be deceived! Some of the biggest threats to your company’s data and network security use social engineering to manipulate targets into taking a specific action - like disclosing personal information that can be stolen and exploited.

Often overlooked by the media in favor of major data breach events, there are few types of social engineering hacks that have the capability to devastate a business.

  1. Vishing: Given the fact that the number of people who fall for phishing attacks and other email scams has declined significantly, it was only a matter of time before hackers found an alternative avenue to exploit their targets. After abandoning it a few years ago in favor to digital scams, vishing - a fraudulent voice call that seeks personal information - have once again returned as a favorite among hackers and thieves.
  2. HTTPS: SSL certificates used to ensure that a website was legitimate and secure enough to protect your personal information. Websites that have ‘https’ no longer signifies security, as hackers have begun using websites that give away SSL certificates for free and using them to lull victims into a false sense of security. To make sure a website is secure, you’ll want to look for indication of an extended validation SSL (EV-SSL) which are not offered for free! EV-SSLs are signified with a green bar.
  3. Website Copy-Cats: Scammers have become very skilled at making spoof websites that look and feel just like the authentic website but are actually littered with all typesof malware. For example, after the Equifax data loss event in June 2017, Equifax set up a website to help their clients who had their information compromised with the URL: equifaxsecurity2017.com. A spoof of that website, with the domain securityequifax2017.com, was so convincing - it even tricked Equifax themselves! A few things to keep an eye out for when trying to determine if a website is legitimate, include:
    1. Make sure the URL is correct.
    2. Avoid giving out information unless a site has an EV-SSL.
    3. Look for seals of trust from other IT security websites.
    4. Beware of misspellings, typos and broken English.
  4. Every Word Password Theft: There are a lot of hacking tools that will scan through databases - including every word in the dictionary. These tools significantly increase the likelihood that a password that includes an actual word will be cracked and exploited. The best practices are ones that mix numbers, letters and symbols that make no sense.

When it comes to digital threats, for every exploit or hack that is prevented, a few, more advanced ones are developed. The best way to keep your business, and it’s data, safe is to take proactive measures and execute safe internet practices all times - and that goes for your employees, as well! Would you like to learn more about how you can stay ahead of hackers? Call us at Aniar IT Services.

These Smartphones Make an Excellent Gift (Even To ...
Tip of the Week: Using Your Smartphone More Effect...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, September 25 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Tech Term Google Business Computing Email Cloud Hackers Innovation Microsoft Network Security Data Backup Malware Android User Tips Data Recovery Cloud Computing Hardware Mobile Devices Internet VoIP Data Backup Managed IT Services Smartphones Internet of Things Artificial Intelligence How To Communication Small Business Collaboration Browser IT Services Windows 10 Saving Money Cybercrime Computers Applications Chrome Cybersecurity Smartphone Windows Network Software Communications Vulnerability Gadgets Business Management IT Support Data Protection Office 365 Word Ransomware Business Facebook Spam Router Connectivity Mobile Device Management Workplace Tips Data Security Money Two-factor Authentication BDR Passwords Outsourced IT Hosted Solutions Efficiency Managed Service Windows 7 Password Managed IT services Microsoft Office Save Money Blockchain Bring Your Own Device Paperless Office Operating System IT Management Redundancy App Telephone Systems Website Social Engineering BYOD Avoiding Downtime Miscellaneous Upgrade Identity Theft Phishing Comparison Social Media IT Plan Remote Monitoring Settings OneNote Law Enforcement Sports Virtualization CES Unsupported Software Data Storage Managed IT Computer Encryption Business Intelligence Information Update Infrastructure Server Virtual Assistant Content Management Spam Blocking VPN Business Continuity Apps Alert The Internet of Things Disaster Recovery Staff FENG Computer Care Bandwidth Cortana Skype Wireless Internet Outlook Government Charger Hosted Computing Legal Automation Travel Remote Work Firewall Amazon Web Services Accountants Voice over Internet Protocol Password Management Tools Big Data Work/Life Balance MSP Patch Management Servers Password Manager Nanotechnology Start Menu Telephone System HIPAA USB Solid State Drive Frequently Asked Questions Recovery Entertainment Wireless Charging Inventory Meetings NIST Criminal Windows 10s Google Drive Unified Threat Management Holiday Downtime Sync Multi-Factor Security Screen Mirroring Millennials File Sharing Digital Signature HVAC Business Mangement Smart Tech Electronic Medical Records Wire Audit Physical Security Excel Machine Learning Google Apps Mobile Device Employer-Employee Relationship Cryptocurrency Addiction Private Cloud Mobile Computing Online Shopping Productivity Root Cause Analysis Gmail Cast Value Workforce Training Credit Cards PDF Flash Google Docs Specifications Data Management Tip of the week YouTube Workers Access Control Wi-Fi Safe Mode Public Cloud Smart Office Evernote Cleaning Telephony Trending Recycling Devices Remote Worker Fraud HaaS Scam Networking Augmented Reality Human Resources Computer Fan Windows Server 2008 Authentication Data loss Cache Software Tips HBO Document Management Camera Keyboard Practices eWaste Thought Leadership Botnet Telecommuting Wiring Amazon Enterprise Content Management Emergency Productivity Marketing Hacker Managing Stress Budget Printers Customer Relationship Management Managed Service Provider Competition IP Address Users Hiring/Firing Twitter Customer Service Fun WiFi Mobile Office Domains Compliance Wireless Windows 10 Public Speaking Regulation Quick Tips Hard Drives Presentation Search Lithium-ion battery Company Culture Wireless Technology 5G Tech Support IBM CrashOverride Safety