094 90 48200     Get SUPPORT

Aniar IT Services Blog

Would Your Users be Tricked by Social Engineering?

Would Your Users be Tricked by Social Engineering?

The term social engineering may not seem nearly as intimidating as other cybersecurity terms like ransomware or denial of service. Don’t be deceived! Some of the biggest threats to your company’s data and network security use social engineering to manipulate targets into taking a specific action - like disclosing personal information that can be stolen and exploited.

Often overlooked by the media in favor of major data breach events, there are few types of social engineering hacks that have the capability to devastate a business.

  1. Vishing: Given the fact that the number of people who fall for phishing attacks and other email scams has declined significantly, it was only a matter of time before hackers found an alternative avenue to exploit their targets. After abandoning it a few years ago in favor to digital scams, vishing - a fraudulent voice call that seeks personal information - have once again returned as a favorite among hackers and thieves.
  2. HTTPS: SSL certificates used to ensure that a website was legitimate and secure enough to protect your personal information. Websites that have ‘https’ no longer signifies security, as hackers have begun using websites that give away SSL certificates for free and using them to lull victims into a false sense of security. To make sure a website is secure, you’ll want to look for indication of an extended validation SSL (EV-SSL) which are not offered for free! EV-SSLs are signified with a green bar.
  3. Website Copy-Cats: Scammers have become very skilled at making spoof websites that look and feel just like the authentic website but are actually littered with all typesof malware. For example, after the Equifax data loss event in June 2017, Equifax set up a website to help their clients who had their information compromised with the URL: equifaxsecurity2017.com. A spoof of that website, with the domain securityequifax2017.com, was so convincing - it even tricked Equifax themselves! A few things to keep an eye out for when trying to determine if a website is legitimate, include:
    1. Make sure the URL is correct.
    2. Avoid giving out information unless a site has an EV-SSL.
    3. Look for seals of trust from other IT security websites.
    4. Beware of misspellings, typos and broken English.
  4. Every Word Password Theft: There are a lot of hacking tools that will scan through databases - including every word in the dictionary. These tools significantly increase the likelihood that a password that includes an actual word will be cracked and exploited. The best practices are ones that mix numbers, letters and symbols that make no sense.

When it comes to digital threats, for every exploit or hack that is prevented, a few, more advanced ones are developed. The best way to keep your business, and it’s data, safe is to take proactive measures and execute safe internet practices all times - and that goes for your employees, as well! Would you like to learn more about how you can stay ahead of hackers? Call us at Aniar IT Services.

These Smartphones Make an Excellent Gift (Even To ...
Tip of the Week: Using Your Smartphone More Effect...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, December 12 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Tech Term User Tips Google Data Backup Cloud Business Computing Data Recovery Microsoft Email Hackers Innovation Hardware Data Network Security Malware Cloud Computing Internet VoIP Workplace Tips Browser Hosted Solutions Business Android Mobile Devices Managed IT Services Communication How To Network Backup Smartphones IT Support IT Services Artificial Intelligence Windows 10 Smartphone Internet of Things Communications Small Business Chrome Windows Efficiency Office 365 Information Word Cybercrime Saving Money Collaboration Business Management Spam BDR Computer Cybersecurity Outsourced IT Business Continuity Software Computers Applications Gadgets Server Miscellaneous Ransomware Vulnerability Router Data Protection Managed Service Money Mobile Device Management Two-factor Authentication Facebook Productivity Passwords Connectivity Data Security Data Storage Microsoft Office Fraud Encryption Redundancy Voice over Internet Protocol Software as a Service Human Resources Telephone Systems Infrastructure Keyboard Social Engineering Content Management Spam Blocking Website VPN Avoiding Downtime Phishing Password Virtual Assistant Upgrade Bring Your Own Device Comparison Blockchain Operating System IT Management Social Media Google Docs App Save Money BYOD Law Enforcement Paperless Office Google Drive Holiday Telephony Identity Theft Scam Managed IT Update Telephone System Mobile Device Business Intelligence IT Plan Remote Monitoring Settings OneNote Windows 7 Sports Virtualization Apps Unsupported Software Managed IT services CES Training Recycling Devices Travel Remote Work Patch Management Computer Fan Authentication Tools Work/Life Balance YouTube Mouse Data loss Safe Mode Big Data Software Tips Practices Start Menu Smart Office Frequently Asked Questions Cache Recovery Networking Shortcuts Amazon Sync Multi-Factor Security Remote Worker eWaste Thought Leadership Alert Staff WiFi FENG Bandwidth Millennials Microchip Cortana Excel Wireless Internet Charger Hosted Computing Document Management Camera Enterprise Content Management Amazon Web Services Accountants Wiring Legal Automation Flash Password Manager Nanotechnology Value Workforce Search Engine HIPAA Tip of the week USB Solid State Drive Wireless Charging Inventory Specifications Meetings Password Management Windows 10s Trending Firewall Downtime Criminal Screen Mirroring Wi-Fi Digital Signature HaaS MSP Business Mangement Smart Tech Servers Bing Electronic Medical Records Windows Server 2008 Wire Audit Physical Security Google Apps Entertainment Warranty Employer-Employee Relationship NIST Private Cloud Augmented Reality Online Shopping Unified Threat Management Root Cause Analysis HBO Addiction Cast Credit Cards PDF File Sharing Gmail Botnet Telecommuting HVAC Help Desk Data Management Computer Care Workers Access Control Disaster Recovery Machine Learning Printer Cryptocurrency Public Cloud The Internet of Things Evernote Cleaning Skype Mobile Computing Outlook Government Search Budget Regulation Customer Relationship Management Competition Quick Tips IP Address Users CrashOverride Customer Service Company Culture Mobile Office Mobility Domains Managed Service Provider Wireless Managing Stress Windows 10 Printers Hiring/Firing Public Speaking Twitter Presentation Fun Lithium-ion battery Wireless Technology 5G Tech Support Compliance IBM Emergency Safety Productivity Hard Drives Marketing Hacker