Social Engineering: A Threat to Your Cybersecurity
Social engineering is the use of psychological manipulation to gather confidential information. Criminals are always looking to exploit you for valuable data: personal logins, bank accounts, and even remote access to your computer. Whenever you log on, they could be trying to steal your information through malware-filled links or fraudulent websites.
Why a Great IT Department Is Not Enough
You interact with certain, trusted companies on a daily basis. You may glance at an email from your office supplier, click their link, and log in to confirm this week’s order for manila folders, only to find that it was a fraudulent website stealing your password.
The growing sophistication of cybersecurity has made it very difficult to breach your software from the outside. With a dependable firewall and anti-malware suite, your computer is rock-solid. But that is only the first half of the equation. You are the second half.
Criminals know that manipulating your trust is easier than hacking their way past your IT department, so you play an important role in maintaining your business’s safety.
What Can I Do?
The best solution is to always double-check anything asking for your confidential information. If you’re clicking a hyperlink, make sure you know exactly where it’s directing you before you click it; if you’re logging into a website, make sure it’s secure and verified. All it takes is for one user to log in to a fraudulent website for a criminal to have the key that lets them walk right past all of your IT department’s efforts.
However, sometimes it’s hard to follow-up with this due diligence when we’re busy. That is why it’s important to recognize the telltale signs of social engineering at-a-glance, especially in the one communication you take part in every day.
Double-Check Your Emails
Fraudulent (or “phishing”) emails are responsible for the majority of cybersecurity breaches, some of which have targeted truly massive companies—from international banks to social media conglomerates.
Always be on the lookout for the key components of a phishing email:
- The sender is an unrecognized person that is not affiliated with your business.
- Names of trusted senders are included in an otherwise unusual address (ex. “firstname.lastname@example.org”).
- The email is addressed to an unusual group of recipients (ex. People in unrelated departments or even every employee).
- The email is addressed to recipients uninvolved with the supposed subject of the message.
- The email is sent outside of business hours or at an irregular time.
- The subject line consists of random characters or completely unrelated information.
- The subject line references you despite you not recognizing the sender.
Links and Attachments
- The email includes unusual hyperlinks or attachments, especially when placed in odd locations throughout the email.
- The email includes hyperlinks that have titles unrelated to their locations (ex. A “Login to your Staples account” link directing you to an unknown website).
- The email’s message wants you to urgently take an unusual action, such as clicking a link before your account is deleted.
- The email’s message contains grammar or spelling errors where it normally would not.
All of these examples pressure you into making a bad decision you wouldn’t normally make. That pressure keeps you from acting on your suspicions by keeping you on a fake time crunch.
So take your time to analyze anything unusual. If something seems suspicious, it probably is. Let your IT managed services company know so they can verify whether it’s a real threat or just a false alarm.
Watch out for social engineering and keep your business safe and secure.
Experienced technology executive with the vision and ability to obtain results. Expert in design and delivery of cost-effective, high performance information technology infrastructure solutions that address complex business problems. Strong network technology background especially in the financial services sector; knowledgeable in many aspects of trading technologies and low latency solutions.