Notice: Undefined index: option in /var/www/html/jc.infradapt.com/plugins/system/fixfrontedit/fixfrontedit.php on line 20 Social Engineering Tag http://jc.infradapt.com/index.php/blog Fri, 29 Mar 2024 15:21:30 +0000 Joomla! - Open Source Content Management en-gb 5 Security Analogies to Help You Better Understand Hacking http://jc.infradapt.com/index.php/blog/entry/5-security-analogies-to-help-you-better-understand-hacking http://jc.infradapt.com/index.php/blog/entry/5-security-analogies-to-help-you-better-understand-hacking

How often do you read a blog article about network security only to be blown away by all of the overly complicated and confusing jargon of the industry? We know that it’s not necessarily your specialty, but it’s still important that you understand how network security works for your organization. While the complicated details should be left to IT professionals, we can help you better understand the general idea of security by comparing it to a locked door.

]]>
j.reilly@infradapt.com (John Reilly) Infradapt Blog Fri, 08 Dec 2017 13:30:05 +0000
Would Your Users be Tricked by Social Engineering? http://jc.infradapt.com/index.php/blog/entry/would-your-users-be-tricked-by-social-engineering http://jc.infradapt.com/index.php/blog/entry/would-your-users-be-tricked-by-social-engineering

The term social engineering may not seem nearly as intimidating as other cybersecurity terms like ransomware or denial of service. Don’t be deceived! Some of the biggest threats to your company’s data and network security use social engineering to manipulate targets into taking a specific action - like disclosing personal information that can be stolen and exploited.

]]>
j.reilly@infradapt.com (John Reilly) Infradapt Blog Fri, 17 Nov 2017 13:30:16 +0000
Tip of the Week: Ways to Be Active and Proactive With Your Network Security http://jc.infradapt.com/index.php/blog/entry/tip-of-the-week-ways-to-be-active-and-proactive-with-your-network-security http://jc.infradapt.com/index.php/blog/entry/tip-of-the-week-ways-to-be-active-and-proactive-with-your-network-security

Security troubles have many causes, but the only way to protect your business from any of them is to implement a comprehensive enterprise-level security solution. There are two other ways that you can work to protect your business, implementing software patches, and avoiding social engineering attempts.

]]>
j.reilly@infradapt.com (John Reilly) Infradapt Blog Wed, 05 Apr 2017 12:30:22 +0000
How an End User Might Accidentally Undermine Your Security: 10 Innocent Mistakes http://jc.infradapt.com/index.php/blog/entry/how-an-end-user-might-accidentally-undermine-your-security-10-innocent-mistakes http://jc.infradapt.com/index.php/blog/entry/how-an-end-user-might-accidentally-undermine-your-security-10-innocent-mistakes b2ap3_thumbnail_innocent_mistakes_400.jpgIf you’re like every other small business out there, you know that the more employees you hire, the more technology that you have to procure. However, when you have more end-users, you provide more avenues for threats to slip into your network infrastructure unnoticed. When all it takes is one simple mistake from a single end-user, how can you minimize the chances of falling victim to an untimely hacking attack?

]]>
j.reilly@infradapt.com (John Reilly) Security Fri, 20 May 2016 12:30:00 +0000
Prevent Being Taken By Familiarizing Yourself With These 4 Social Engineering Tips http://jc.infradapt.com/index.php/newsletter-content/entry/prevent-being-taken-by-familiarizing-yourself-with-these-4-social-engineering-tips-1 http://jc.infradapt.com/index.php/newsletter-content/entry/prevent-being-taken-by-familiarizing-yourself-with-these-4-social-engineering-tips-1 b2ap3_thumbnail_the_risks_of_doing_business_400.jpgDid you know that some of the most successful hackers actually know very little about computer coding? In many cases, a hacker simply tricking someone into handing over their personal information works out even better for them. This is a tactic known as social engineering, and the only way to defend against it is to stay one step ahead of the hacker’s devious plans.


What makes social engineering tactics so dangerous is that there are so many different ways that a hacker can fool their victims. These hackers know how to appeal to the wide range of human emotions in order to get someone so riled up, panicked, or excited that they’ll go ahead and fork over their personal information without considering if the source of the message is legit or not. For business owners, the worst thing about social engineering is that these tactics can bypass your expensive software security solutions, due to the fact that the nature of the scam tricks an employee into manually bypassing it. Therefore, you and your staff should know what social engineering tricks hackers have up their sleeves.

4 Social Engineering Tactics You MUST Be Mindful Of
Generally speaking, most social engineering tactics fall under the category of phishing scams. These are specialized scams where someone’s personal information is targeted, which can often be easily gleaned from a basic Internet and social media search. Note: a reason like social engineering is why it’s best practice to be extra careful regarding the nature of the personal information you post to the web.

Be sure to commit these four social engineering tactics to memory:

  • Play on trusted relationships: There are people in your life who you’ve come to trust over the course of several positive interactions. If a hacker can pose as a person whom you trust, like a close friend or a family member, then they’ve got easy access to your personal information.
  • A request for information: Using tactics similar to the above example, if a hacker can convince you that they’re a bank, insurance company, or any other large institution which holds your account information, then they’ll try to trick the user by requesting a confirmation of your sensitive information, like passwords. Remember, reputable institutions never request this kind of information via email. Also, you should be on the lookout for phone scammers that will try the same approach over the phone.
  • Posing as one who has authority: Some people trust authority figures so much that they’ll do what they’re told without question. Overly trusting people like this can be susceptible to being conned by hackers posing as authority figures, like government agencies and even employers. One such trick that you may have seen in your own inbox is spam messages trying to get you to sign up for “jury duty.”
  • A fake IT department: This one hits a little too close to home for us. Companies that are large enough where your employees aren’t familiar with who runs their IT may fall for an email posing as someone representing their IT department. This is why it’s vital that your staff knows, without a doubt, who’s running your business’s IT, no matter what size of company you operate.

These attacks don’t just come in through email; scammers might attempt to introduce themselves over the phone before they can infiltrate your network.

Having your staff be familiarized with these common tactics will go a long way in keeping your data safe, but there’s more you can do. Like understanding that any unsolicited request for sensitive information, whether it be by email or phone, is an automatic red flag. It’s also prudent to teach your workers to cross reference the contact information provided in the message with what you’ve got on file.

At the end of the day, a software security solution like a spam filter from Infradapt will still help in preventing spam messages from even hitting your inbox in the first place. To protect your company from every tactic in a hacker’s arsenal, call us today at 800.394.2301.

]]>
j.reilly@infradapt.com (John Reilly) Newsletter Wed, 23 Mar 2016 16:00:00 +0000