SMART Blog

Smart Services has been providing independent agents with proactive, fast, and expert technology services since 1991.

Could You Spot a Social Engineering Attack?

Could You Spot a Social Engineering Attack?

As invaluable as the security solutions that protect a network are, they can be effectively rendered useless if a cybercriminal is skilled in social engineering. Social engineering is the practice of using manipulation to access protected resources. If your business and its team are vulnerable to a social engineering attempt, you are missing a critical piece of your data security strategy.

What Makes Social Engineering Effective?
By posing as someone trustworthy, cybercriminals seek the opportunity to do as they will with your business data. These attacks have two factors going in their favor.

First, a social engineering attack isn’t the kind of attack that the average user is on the lookout for. Most people will have heard about botnets and ransomware and other big, external threats, and so won’t think to question what seems to be a legitimate-looking message.

Secondly, there is plenty of data readily available on the Internet to help build a convincing social engineering attack. This data is referred to as open-source intelligence.

Open-source intelligence can come from a vast array of data sources, which only assists an aspiring social engineer. Through some digging on the Internet, a social engineer can find plenty of information to create a more effective attack.

What the Internet Can Provide
With the right research, a social engineer can compile a comprehensive profile of a business, its employees, its operations, and more. Some very brief and incomplete examples are as follows:

Technology
Information about the kind of technology a business leverages is surprisingly common online. Job postings, for example, often identify the hardware and operating system a company uses to ensure that an applicant has a familiarity with the systems they would be working with. The trouble is, this also helps a criminal by identifying which exploits will be effective against a company. Furthermore, if a company isn’t careful, their social media images could provide a cybercriminal with information about their networking hardware.

Employee Information
It is also common for people to overshare on social media, which can easily lead to company information being shared as well. This includes, via social media, images from within the workplace. Such images often reveal the kind of computer used by employees, as well as the contents of their screens and any information displayed on them.

Additionally, many people will discuss their work schedule on social media, as well as provide a detailed account of their professional experience, giving a social engineer more data to work with.

Vendors and Other Companies
External services that provide for a company can help a social engineer gain access to that company, especially if the service provider uses them as evidence of value on their website. Janitorial services and trash pickup services are especially valuable, as data could potentially be stolen after it leaves the business premises.

In short, while protecting your data with firewalls, authentication requirements, and other digital measures is crucial, it is just as crucial to also ensure that your employees are aware of the dangers that social engineering presents. Establishing processes to help thwart social engineering attempts is something that every company should do, as it will help to protect them from these attacks.

For help in planning these processes, reach out to SMART Services at 586 258-0650 .

Let Smart Services position your agency for tomorrow’s technological challenges. For more than 26 years, Smart Services has helped agencies across the U.S. face a changing environment by providing innovative technology solutions that allow agencies to focus on growing their business. MyAgency Cloud, our complete cloud solution, covers all your technology needs in the cloud or at your agency. In today’s competitive environment, it’s time to make your agency technology a strategic asset, instead of a liability. Let us show you how. To learn more, please call our expert agency technology advisor at 586-258-0650.

 

Comments 1

Santillan Linda on Saturday, 31 March 2018 07:13

Blogs aren't only for socializing with others but it may additionally give us useful facts like this.Thank you for sharing informative blog with us. best essay writing service

Blogs aren't only for socializing with others but it may additionally give us useful facts like this.Thank you for sharing informative blog with us. best essay writing service
Already Registered? Login Here
Guest
Wednesday, 23 May 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Windows 10 Scam Proactive USB Presentation Holiday Telephone Systems Employer Employee Relationship Data Protection Web Design Professional Services Debate Emails Hard Drive Legislation Chevy HHR Encryption 3D Printing Branding Data Recovery Private Cloud The Internet of Things eWaste Entertainment Proactive IT Best Practice Doug Vanni webinar Internet Webinar DocStar Business Microsoft Word Online Currency Microsoft Windows 7 Hard Drives WIndows Server 2008 HaaS Amazon Laptop Hetrick and Associates Work/Life Balance WiFi Nanotechnology Update Solid State Drive Tech Tip Business Continuity Computer Forensics Wireless Intranet Identity Mircrosoft Social Networking Bloatware Blockchain Remote Computing WannaCry Computing IT Support Benefits ebay Technology Office 365 Windows 10 Bandwidth Mobility Apps Saving Time Personal Information Meetings Windows 8 Networking Flexibility Patch Management Bryant Caudill Screen Mirroring Supercomputer Sports Email Saving Money Android Alert Youtube PDF VPN Data Backup Spyware Text Messaging Social Engineering Domains iPhone Blogging Office Tips Trending Scott White Tutorial HITECH Act Virtual Desktop Windows Ink Data Breach Language Touchpad Content Filtering Disaster Evernote Marketing Data Privacy Users Microblogging NFL Operating Sysytem Colocation automation Communication Hosted Solution Electronic Medical Records Law Enforcement Analytics Administrator Hosted Solutions Legal Application History Software as a Service Inbound Marketing SMARTweb Defense PowerPoint IT Support Access Device Security social media Workers FAQ Connectivity MySalesResults Data Security Google Budget Running Cable Productivity BYOD Consultant CrashOverride Media Consumption Regulations communications Applied TAM Computers Passwords Unified Threat Management Printer Co-managed IT Identity Theft Training Google Maps Phone System Backup Cleaning IIAI Twitter Data Management How To Bring Your Own Device IT Technicians Tablets Analysis Best Available Cameras SMART Services Jerry Fetty Tablet Cast Avoiding Downtime Document Management Internet Exlporer Instant Messaging Tip of the Week Black Market Wiring Vulnerability Windows Business Computing Data Theft Scalability Windows 10s Firewall Mobile Device Management Microsoft Outlook 2007 Smartphones Work Station Two-factor Authentication Save Time email encryption Best Practices Business Intelligence Tech Support Fraud Risk Management Retail BDR Tech Term Safety Display Information Technology Maintenance Google Drive Innovation Wireless Technology robot App Upgrade Avoid Downtime Reputation Network Managing Stress Hardware Shadow IT Point of Sale User Tips Touchscreen Dark Web Gifts Storage Edge Gift Giving Security Data Storage Samsung Chrome IT Management Video Games Extreme Technology Makeover Back Up Privacy Smart Tech Managed Service Provider End of Support Ciminal Vendor Management ISP Books Television Sales Steve Anderson Hacking Computer repair website Smartphone IT Consultant Antivirus Advertising Administration Miscellaneous iPad IT Solutions Regulation Prodcutivity IT Budget VoIP Devices Human Resources Congratulations Humor Big Data Gmail Search Phishing Microsoft Licensing Small Business Fun Updates Bluetooth Science Audit Productivity Going Green MAIA Collaboration OneDrive Kleinschmidt Insurance Fax Server Network Security Project Management Computer Accessories Managed IT hacker File Sharing Battery Nokia Cloud Managed IT Service Cloud Computing Taxes Worker Commute Excel insurance Management holidays Paperless Office Operating System Mobile Devices Phishing Scam Backkup Teamwork Word Music Sync User Error Wi-Fi Content Filter Managed IT Services Augmented Reality IT solutions Settings Chromecast Browser Customer Relationship Management Shortcut Lifestyle Cost Management Compliance Comparison Travel Mobile Office SaaS Websites Mobile Device Remote Monitoring Financial Technology Emergency Streaming Media iOS Internet of Things Charger Politics Cybersecurity Save Money Gadgets Business Management IoT Outsourced IT lunch and learn Artificial Intelligence Wireless Charging Server Efficiency User Outlook In the News Employer-Employee Relationship data backups Password HIPAA Customer Service Data Loss Workplace Tips Ransomware Government Telephony Computer Fan Credit Cards Apple Images Mobile Security Ubuntu Router agency automation Wearable Technology Virtualization Applications Quick Tips malware Take Your Agency to the Next Level Social IT Services Virus Cybercrime Disaster Recovery Network Congestion Specifications Help Desk GLAD DDoS Mobile Computing Smart Technology OneNote Cortana Biometrics Root Cause Analysis Surge Protector Printer Server Distributed Denial of Service Google Assistant Redundancy Education Commerce Hiring/Firing HBO press release hackers Microsoft Outlook Near Field Communication Office Net Neutrality Managed IT Services Google Docs Programming Video Surveillance Lithium-ion battery Computer Software MSP Files Experience Money Upgrades Automobile Reliable Computing Transportation Uninterrupted Power Supply Virtual Reality Conferencing Recovery Keyboard Thank You Monitoring Chromebook Computer Care WIndows 7 Microsoft Office 2010 video IT Service Mobile Unsupported Software Data IT consulting Wayne Joubert SharePoint Buisness Identities Health Current Events Microsoft Office Printing Jessica Stevenson Hard Disk Drive Company Culture Microsoft Excel Mouse Value Facebook Adobe spam App store

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *