GTSS has been serving the Chapin area since 2009, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Would Your Users be Tricked by Social Engineering?

Would Your Users be Tricked by Social Engineering?

The term social engineering may not seem nearly as intimidating as other cybersecurity terms like ransomware or denial of service. Don’t be deceived! Some of the biggest threats to your company’s data and network security use social engineering to manipulate targets into taking a specific action - like disclosing personal information that can be stolen and exploited.

Often overlooked by the media in favor of major data breach events, there are few types of social engineering hacks that have the capability to devastate a business.

  1. Vishing: Given the fact that the number of people who fall for phishing attacks and other email scams has declined significantly, it was only a matter of time before hackers found an alternative avenue to exploit their targets. After abandoning it a few years ago in favor to digital scams, vishing - a fraudulent voice call that seeks personal information - have once again returned as a favorite among hackers and thieves.
  2. HTTPS: SSL certificates used to ensure that a website was legitimate and secure enough to protect your personal information. Websites that have ‘https’ no longer signifies security, as hackers have begun using websites that give away SSL certificates for free and using them to lull victims into a false sense of security. To make sure a website is secure, you’ll want to look for indication of an extended validation SSL (EV-SSL) which are not offered for free! EV-SSLs are signified with a green bar.
  3. Website Copy-Cats: Scammers have become very skilled at making spoof websites that look and feel just like the authentic website but are actually littered with all typesof malware. For example, after the Equifax data loss event in June 2017, Equifax set up a website to help their clients who had their information compromised with the URL: A spoof of that website, with the domain, was so convincing - it even tricked Equifax themselves! A few things to keep an eye out for when trying to determine if a website is legitimate, include:
    1. Make sure the URL is correct.
    2. Avoid giving out information unless a site has an EV-SSL.
    3. Look for seals of trust from other IT security websites.
    4. Beware of misspellings, typos and broken English.
  4. Every Word Password Theft: There are a lot of hacking tools that will scan through databases - including every word in the dictionary. These tools significantly increase the likelihood that a password that includes an actual word will be cracked and exploited. The best practices are ones that mix numbers, letters and symbols that make no sense.

When it comes to digital threats, for every exploit or hack that is prevented, a few, more advanced ones are developed. The best way to keep your business, and it’s data, safe is to take proactive measures and execute safe internet practices all times - and that goes for your employees, as well! Would you like to learn more about how you can stay ahead of hackers? Call us at GTSS.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 17 March 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Privacy Best Practices Technology Cloud Hackers Microsoft Backup Google Software Business Computing Windows 10 Smartphones Malware Business Hosted Solutions Hardware Network Security Productivity Ransomware Business Continuity Innovation Android Small Business Disaster Recovery Email Computer User Tips Alert Data VoIP Efficiency Internet Data Backup Upgrade Law Enforcement Windows Social Engineering Mobile Devices Telephone Systems Smartphone Cybercrime Quick Tips Collaboration Outsourced IT Money Managed IT Services Network Operating System Miscellaneous Browser Managed IT Services Cybersecurity Server Computers Communications Virtualization How To App Social Media Office Chrome Business Management History Router Data Recovery Data Breach Communication Flexibility Work/Life Balance Passwords Wi-Fi Artificial Intelligence Windows 10 Office 365 Cloud Computing Gadgets Automation Health Safety Google Drive Bring Your Own Device Office Tips Remote Computing Password Spam Mobile Device Management Data Security IT Services Black Market HaaS Recovery Data storage The Internet of Things Government Saving Money End of Support Automobile Internet Exlporer Mobility Marketing Data Storage Microsoft Office IT Management Private Cloud Word Apps Facebook Hacking OneNote Best Practice Public Cloud Physical Security Two-factor Authentication Unsupported Software Gmail Phishing Workplace Tips Data Management Bandwidth Downtime Spam Blocking Redundancy Productivity Avoiding Downtime Holiday Amazon Conferencing Sync Tech Support Vulnerability Users YouTube Humor Specifications HBO Amazon Web Services Emails Going Green Shadow IT Solid State Drive Remote Monitoring Virtual Reality Computer Care Business Intelligence Risk Management Networking IT Support Data loss Online Shopping Telephony User Error Wireless Monitor Audit Update Worker Commute Samsung Screen Mirroring Millennials Politics Current Events Outlook NarrowBand Patch Management Evernote Skype Search Value Computer Fan Cast Workforce Keyboard Knowledge Frequently Asked Questions Wireless Technology Scam Apple Internet exploMicrosoft Netflix Start Menu How to DDoS Reputation FENG Google Docs BDR Network Congestion Excel Legal iPhone Advertising IT Support Tools Laptop Experience Lithium-ion battery Customers Website Telecommuting IT Consultant Tip of the week Chromecast Mobile Device Managed Service Provider Touchpad Music Voice over Internet Protocol IT Plan Remote Work Leadership Windows Server 2008 Video Games Settings Managed IT Battery Content Sports Wearable Technology Encryption Identity Theft Employer-Employee Relationship Windows 7 Scalability Uninterrupted Power Supply Hybrid Cloud Internet of Things Botnet Education Audiobook VPN USB Root Cause Analysis Multi-Factor Security Software Tips Credit Cards Flash PDF Travel Computing Infrastructure Entertainment Notifications Trending BYOD Fraud webinar Instant Messaging Files Cleaning Information Technology Robot Windows 10s Applications Save Money Techology Relocation Meetings Comparison Electronic Medical Records Charger Books Save Time Emergency Webinar Hiring/Firing IT solutions Employer Employee Relationship WiFi Computer Accessories Loyalty Transportation Thank You Bluetooth SaaS Benefits Congratulations Firewall Worker Assessment CrashOverride Smart Technology Rootkit Television Two Factor Authentication Training Public Computer Troubleshooting Vendor Management Big Data

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

No comments yet.