GTSS Blog

GTSS has been serving the Chapin area since 2009, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Would Your Users be Tricked by Social Engineering?

Would Your Users be Tricked by Social Engineering?

The term social engineering may not seem nearly as intimidating as other cybersecurity terms like ransomware or denial of service. Don’t be deceived! Some of the biggest threats to your company’s data and network security use social engineering to manipulate targets into taking a specific action - like disclosing personal information that can be stolen and exploited.

Often overlooked by the media in favor of major data breach events, there are few types of social engineering hacks that have the capability to devastate a business.

  1. Vishing: Given the fact that the number of people who fall for phishing attacks and other email scams has declined significantly, it was only a matter of time before hackers found an alternative avenue to exploit their targets. After abandoning it a few years ago in favor to digital scams, vishing - a fraudulent voice call that seeks personal information - have once again returned as a favorite among hackers and thieves.
  2. HTTPS: SSL certificates used to ensure that a website was legitimate and secure enough to protect your personal information. Websites that have ‘https’ no longer signifies security, as hackers have begun using websites that give away SSL certificates for free and using them to lull victims into a false sense of security. To make sure a website is secure, you’ll want to look for indication of an extended validation SSL (EV-SSL) which are not offered for free! EV-SSLs are signified with a green bar.
  3. Website Copy-Cats: Scammers have become very skilled at making spoof websites that look and feel just like the authentic website but are actually littered with all typesof malware. For example, after the Equifax data loss event in June 2017, Equifax set up a website to help their clients who had their information compromised with the URL: equifaxsecurity2017.com. A spoof of that website, with the domain securityequifax2017.com, was so convincing - it even tricked Equifax themselves! A few things to keep an eye out for when trying to determine if a website is legitimate, include:
    1. Make sure the URL is correct.
    2. Avoid giving out information unless a site has an EV-SSL.
    3. Look for seals of trust from other IT security websites.
    4. Beware of misspellings, typos and broken English.
  4. Every Word Password Theft: There are a lot of hacking tools that will scan through databases - including every word in the dictionary. These tools significantly increase the likelihood that a password that includes an actual word will be cracked and exploited. The best practices are ones that mix numbers, letters and symbols that make no sense.

When it comes to digital threats, for every exploit or hack that is prevented, a few, more advanced ones are developed. The best way to keep your business, and it’s data, safe is to take proactive measures and execute safe internet practices all times - and that goes for your employees, as well! Would you like to learn more about how you can stay ahead of hackers? Call us at GTSS.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 16 January 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Hackers Microsoft Google Backup Software Business Computing Smartphones Windows 10 Malware Business Ransomware Hosted Solutions Hardware Network Security Productivity Small Business Disaster Recovery Email Computer Business Continuity Innovation Android Efficiency Internet User Tips Alert Data VoIP Cybercrime Law Enforcement Data Backup Upgrade Windows Social Engineering Mobile Devices Telephone Systems Smartphone Managed IT Services Social Media Cybersecurity Server Office Virtualization How To Quick Tips Collaboration Outsourced IT Money Managed IT Services Chrome Miscellaneous Network Operating System Computers Communications Browser App Gadgets Communication Cloud Computing Automation Password Safety History Bring Your Own Device Office Tips Router Remote Computing Mobile Device Management Spam Business Management Flexibility Data Breach Work/Life Balance Wi-Fi Artificial Intelligence Office 365 Passwords Health Windows 10 Data Recovery Google Drive Best Practice Workplace Tips OneNote Downtime Holiday Gmail Unsupported Software Data Management IT Services Bandwidth HaaS Phishing Spam Blocking Data storage Government Productivity Black Market Data Security End of Support Recovery Automobile Word The Internet of Things Mobility Marketing Two-factor Authentication Saving Money Internet Exlporer Microsoft Office Apps Private Cloud Facebook Hacking Redundancy Public Cloud Avoiding Downtime Data Storage Physical Security IT Management Specifications Amazon Web Services Computing Infrastructure PDF Music Sports Entertainment Remote Monitoring Encryption IT Plan Leadership Settings Files Business Intelligence Instant Messaging Online Shopping Uninterrupted Power Supply Applications Telephony Information Technology Robot Wearable Technology VPN Update Techology Employer-Employee Relationship Relocation Outlook Millennials Evernote Users Skype Root Cause Analysis USB Notifications Software Tips Humor Frequently Asked Questions Workforce Cleaning Virtual Reality Start Menu webinar Save Money Risk Management Google Docs BYOD IT Support Excel Windows 10s User Error BDR Tech Support Worker Commute Tools Meetings Wireless Monitor Conferencing YouTube Politics Website Search Tip of the week Vulnerability Going Green Telecommuting Shadow IT Emails Apple Keyboard Voice over Internet Protocol HBO How to Windows Server 2008 Solid State Drive Internet exploMicrosoft Computer Care Remote Work Managed IT Data loss Networking Reputation iPhone NarrowBand Legal Windows 7 Audit Advertising Samsung Identity Theft Patch Management Botnet Screen Mirroring Current Events Customers Managed Service Provider Wireless Technology Multi-Factor Security Mobile Device Flash Computer Fan Value Credit Cards DDoS Scam Travel Cast Knowledge Netflix Trending Video Games Battery FENG Laptop Fraud Content Lithium-ion battery Network Congestion IT Support Chromecast Comparison Scalability Amazon Education Sync Hybrid Cloud Internet of Things Touchpad Experience Audiobook IT Consultant Firewall Worker CrashOverride Assessment Smart Technology Rootkit Television Two Factor Authentication WiFi Training Public Computer Troubleshooting Vendor Management Big Data Electronic Medical Records Charger Books Save Time Emergency Webinar Hiring/Firing IT solutions Employer Employee Relationship Computer Accessories Thank You Loyalty Transportation Congratulations Bluetooth SaaS Benefits

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

No comments yet.