Smart Services has been providing independent agents with proactive, fast, and expert technology services since 1991.

Could You Spot a Social Engineering Attack?

Could You Spot a Social Engineering Attack?

As invaluable as the security solutions that protect a network are, they can be effectively rendered useless if a cybercriminal is skilled in social engineering. Social engineering is the practice of using manipulation to access protected resources. If your business and its team are vulnerable to a social engineering attempt, you are missing a critical piece of your data security strategy.

What Makes Social Engineering Effective?
By posing as someone trustworthy, cybercriminals seek the opportunity to do as they will with your business data. These attacks have two factors going in their favor.

First, a social engineering attack isn’t the kind of attack that the average user is on the lookout for. Most people will have heard about botnets and ransomware and other big, external threats, and so won’t think to question what seems to be a legitimate-looking message.

Secondly, there is plenty of data readily available on the Internet to help build a convincing social engineering attack. This data is referred to as open-source intelligence.

Open-source intelligence can come from a vast array of data sources, which only assists an aspiring social engineer. Through some digging on the Internet, a social engineer can find plenty of information to create a more effective attack.

What the Internet Can Provide
With the right research, a social engineer can compile a comprehensive profile of a business, its employees, its operations, and more. Some very brief and incomplete examples are as follows:

Information about the kind of technology a business leverages is surprisingly common online. Job postings, for example, often identify the hardware and operating system a company uses to ensure that an applicant has a familiarity with the systems they would be working with. The trouble is, this also helps a criminal by identifying which exploits will be effective against a company. Furthermore, if a company isn’t careful, their social media images could provide a cybercriminal with information about their networking hardware.

Employee Information
It is also common for people to overshare on social media, which can easily lead to company information being shared as well. This includes, via social media, images from within the workplace. Such images often reveal the kind of computer used by employees, as well as the contents of their screens and any information displayed on them.

Additionally, many people will discuss their work schedule on social media, as well as provide a detailed account of their professional experience, giving a social engineer more data to work with.

Vendors and Other Companies
External services that provide for a company can help a social engineer gain access to that company, especially if the service provider uses them as evidence of value on their website. Janitorial services and trash pickup services are especially valuable, as data could potentially be stolen after it leaves the business premises.

In short, while protecting your data with firewalls, authentication requirements, and other digital measures is crucial, it is just as crucial to also ensure that your employees are aware of the dangers that social engineering presents. Establishing processes to help thwart social engineering attempts is something that every company should do, as it will help to protect them from these attacks.

For help in planning these processes, reach out to SMART Services at 586 258-0650 .

Let Smart Services position your agency for tomorrow’s technological challenges. For more than 26 years, Smart Services has helped agencies across the U.S. face a changing environment by providing innovative technology solutions that allow agencies to focus on growing their business. MyAgency Cloud, our complete cloud solution, covers all your technology needs in the cloud or at your agency. In today’s competitive environment, it’s time to make your agency technology a strategic asset, instead of a liability. Let us show you how. To learn more, please call our expert agency technology advisor at 586-258-0650.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, 21 March 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Professional Services Identity Theft Touchscreen MSP Private Cloud WannaCry Blogging Computer Printer Data Recovery Telephone Systems website Business Management Mobile Devices File Sharing SharePoint Paperless Office Network Disaster Recovery Travel Congratulations Programming Web Design Scalability Music Productivity Content Filtering Business Computing Business Wireless Technology Sales Encryption Point of Sale Emails Upgrade Update Remote Monitoring Hacking PowerPoint Television Unified Threat Management Doug Vanni Best Practices Hosted Solutions Proactive IT USB Computing IT Budget 3D Printing Upgrades Retail Save Time Augmented Reality BDR Scott White Customer Relationship Management Bandwidth Phishing hacker Human Resources Entertainment Hardware SMART Services Excel Cast Specifications Audit Two-factor Authentication Adobe Chromecast Alert Battery Experience Cloud Computing Managed IT Services Mobile Office MAIA Applied TAM Steve Anderson Android Back Up Phone System Lithium-ion battery VPN Updates Cortana Worker Commute Twitter Managing Stress Windows 10 WIndows Server 2008 Prodcutivity Users Microsoft Law Enforcement Employer-Employee Relationship Best Practice NFL iPhone MySalesResults Artificial Intelligence Document Management Tablets Recovery Gadgets Customer Service Surge Protector Avoid Downtime IT solutions Hiring/Firing Root Cause Analysis Transportation Hard Drive HIPAA Teamwork IT Management Microsoft Word Windows 8 Backup Microsoft Office Holiday Risk Management Net Neutrality Backkup Mircrosoft WiFi Applications IT Solutions Wiring App Shortcut Value Going Green Politics Phishing Scam Virtualization Vulnerability Maintenance Computer repair Current Events Remote Computing Software Colocation Social Smartphones Help Desk Budget Quick Tips Media Consumption SMARTweb Defense Computer Fan Search Microsoft Outlook CrashOverride Workplace Tips Reliable Computing Office Tips Social Networking Virtual Desktop Bloatware Social Engineering Data Security Video Surveillance Gmail Operating Sysytem Images Fax Server Office 365 Tech Term Wireless DDoS Business Intelligence automation Jerry Fetty Cameras Instant Messaging Marketing In the News Health Files Compliance Wi-Fi Cybersecurity Cybercrime Firewall Comparison Network Security Administration Safety Avoiding Downtime Work/Life Balance Computer Care HITECH Act Gift Giving Efficiency Touchpad Personal Information malware ebay Conferencing Sync Supercomputer Benefits User Error The Internet of Things Bryant Caudill Office Google Google Maps spam Science IT Support HBO Virtual Reality BYOD Tablet Cleaning Analytics Storage Running Cable Wayne Joubert Tech Tip IT Technicians email encryption Amazon Saving Money social media Mouse Hosted Solution Privacy Telephony Server Credit Cards Smart Technology Browser Facebook Intranet IoT Hetrick and Associates Software as a Service Branding Printer Server Microblogging Fun Lifestyle Network Congestion VoIP Money Mobile Device Management Internet Exlporer Outlook Information Technology Regulation agency automation Vendor Management Debate Licensing webinar Email Apple Disaster Technology IT Consultant Hard Disk Drive Jessica Stevenson Thank You Productivity Legal Proactive IT Support Flexibility Streaming Media Microsoft Outlook 2007 Google Docs Keyboard Data Storage IT consulting Miscellaneous Distributed Denial of Service Shadow IT Cloud Dark Web Chevy HHR Language holidays hackers Buisness Advertising Identities Meetings Administrator Business Continuity WIndows 7 Save Money Trending Charger Training DocStar communications Smartphone Workers Internet of Things Bring Your Own Device Data Backup Google Drive Networking PDF Wireless Charging Automobile Solid State Drive Tip of the Week Taxes Microsoft Windows 7 Biometrics Mobility Inbound Marketing Computers Blockchain Ubuntu Project Management Evernote Device Security insurance Books Passwords Fraud IT Service Access IT Services Collaboration Router Windows Ink Data Management Extreme Technology Makeover User Tips Ciminal IIAI Outsourced IT Legislation GLAD Unsupported Software Settings Data video Reputation Domains OneNote Emergency HaaS Big Data Tech Support Kleinschmidt Insurance Government Managed Service Provider Chrome Best Available Employer Employee Relationship Youtube Internet Video Games Cost Management Work Station Nanotechnology Spyware Presentation eWaste Sports Antivirus Windows Virus Managed IT Services Near Field Communication Commerce robot Communication Mobile Computing Samsung Tutorial Windows 10 Consultant Managed IT Humor Company Culture Data Breach Screen Mirroring Regulations Application Saving Time Take Your Agency to the Next Level Mobile Device Windows 10s User Laptop Devices Scam Bluetooth Security iOS End of Support History OneDrive Websites Display Password Innovation Hard Drives Patch Management How To Managed IT Service ISP lunch and learn Co-managed IT Computer Accessories Data Protection Black Market Wearable Technology Gifts Nokia press release Ransomware Education Small Business Operating System Mobile Edge SaaS Apps Webinar Electronic Medical Records Uninterrupted Power Supply FAQ iPad Microsoft Excel Text Messaging Redundancy Online Currency Microsoft Office 2010 data backups Data Loss Word

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *