Get Started Today!  217-475-0226

Would Your Users Fall For These Social Engineering Schemes?

Would Your Users Fall For These Social Engineering Schemes?

Social engineering is one of the trickiest parts of protecting your organization. It might sound like something out of a science fiction flick, but it’s one of the most dangerous attacks that a hacker can use against your business. Social engineering attempts to manipulate the target into giving away sensitive credentials or personal information for the purpose of stealing identities and other malicious intentions.

Here are some of the most popular social engineering hacks that you’ll have to watch out for in the business world.

  • Vishing: More people are aware of phishing attacks than ever before, so naturally hackers had to pick up the slack somehow. Vishing is the alternative option that they are now trying to use, which features a voicemail asking for personal information.
  • HTTPS: SSL certificates can make sure that users are aware of whether or not a website is secure enough to protect your personal information. However, HTTPS doesn’t necessarily mean that a website is using security. Hackers can lure in victims by providing “free” SSL certificates to organizations, providing them with a false sense of security. You need to find proof that the website using SSL has an extended validation (EV-SSL), which is not offered for free at all. You’ll see a green bar in the URL bar when this type of encryption is available.
  • Website Copycats: Some scammers have even gone so far as to make websites that look exactly like reputable sites that are designed to harvest credentials or infect computers with malware. One example of this is the Equifax data loss incident which occurred in June 2017. Equifax had set up a website to help clients who had their information stolen, which used the URL equifaxsecurity2017.com. However, hackers capitalized on this event and created a spoof website using the domain securityequifax2017.com. The result tricked Equifax themselves. Here are some tips to help you avoid these spoofed websites:
    • Make sure the URL is correct
    • Don’t give information to sites that aren’t using EV-SSL
    • Look for seals of trust from reputable IT security websites
    • Be on the lookout for spelling errors, typos, or broken English
  • Every Word Password Theft: Hacking tools have certainly developed into more sophisticated threats, going so far as to utilize every single word in the dictionary to crack passwords. These password crackers can create hundreds of thousands of credentials in a matter of minutes, all using a dictionary attack against unwary users. Therefore, the best approach to creating strong passwords is to use numbers, letters, and symbols to make a mixture that nobody would expect.

Online threats can be a considerable problem for your organization, especially when they use each and every exploit against you. Thankfully, with some proactive measures that can keep your business safe, you’ll have a much easier time going about your online duties without exposing your data to threats. To learn more about how to protect your business, reach out to us at 217-475-0226.

Tip of the Week: Gmail Is Made Even Easier When Yo...
Tip of the Week: Your Mouse Can Do a Lot With a Cl...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, September 22 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Tech Term Network Security Hackers Business Computing Software IT Support Android Data Recovery Malware User Tips Email Google Data Business Management Cybersecurity Data Backup Small Business Smartphone Backup Computer Internet Cloud Communications Managed IT Services Efficiency Innovation Ransomware Business Technology Windows 10 Productivity Collaboration IT Services Artificial Intelligence Mobile Device Management Cybercrime Phishing Cost Management Communication IT Management Business Hardware BDR Passwords Applications Browser Data Security Patch Management Gadgets Encryption Network Two-factor Authentication Facebook Managed IT Services Maintenance Blockchain Hard Drive Saving Money Social Media Microsoft Office Antivirus Update App Mobile Device Access Control Outsourced IT Data Breach Word Vulnerabilities Data Protection Touchscreen Microsoft Digital Automation Document Management Law Enforcement Bandwidth Cloud Computing Windows Apps Holiday Start Menu Laptop Websites VPN Information Scam Vendor Server Bitcoin Internet of Things Data Management Operating System SaaS Conferencing Social Engineering Disaster Recovery Data loss Smartphones Tech Terms Business Continuity Remote Monitoring Hacking Gmail Money Save Money Project Management Office 365 Alert Managed Service Search Spam Backup and Disaster Recovery Unified Threat Management Upgrades Content Legal Startup Worker Big Data Samsung Electronic Medical Records SharePoint Telephony Unified Threat Management Download Tip of the week Hard Drive Disposal Compliance Managed Service Provider Error Specifications Augmented Reality Addiction Google Maps Microsoft Excel Website YouTube Outlook Miscellaneous Piracy Bluetooth Vendor Mangement BYOD Downloads Computing Infrastructure Disaster Health IT Distributed Denial of Service Screen Reader History VoIP Upload email scam Regulations Access Emergency Telephone Television Virtual Reality Machine Learning Cryptocurrency Settings Automobile Hosted Solutions Google Docs Software License Wireless Headphones Business Mangement WiFi Mobile Security Printer Telephone Systems VoIp Networking Legislation Freedom of Information Company Culture IBM Best Practice Trends Unified Communications Cortana Mobile Devices Accountants Running Cable Spyware IT Support Vulnerability Social Network Mouse Network Management Audit HTML Administration Redundancy Monitoring Budget Cleaning Solid State Drive Wireless Sports News Paperless Office Tablet Software as a Service Consultant Travel Mobility Business Cards Virtualization Knowledge Identity Theft Corporate Profile Time Management Unsupported Software Gamification Printing eWaste Training Cabling Analytics DDoS Customer Resource management Service Level Agreement Virtual Assistant Employer-Employee Relationship Management Information Technology Computers Fake News Multi-factor Authentication Database How to Managed IT Username Apple Password Desktop Chromebook Government Robot Equifax Telephone System Uninterrupted Power Supply Google Drive Going Green Computer Care Excel Devices Computing Comparison Mobile Technology Nanotechnology User Tip Device security Tactics Virus Google Calendar Downtime Emails Multi-Factor Security Printers Twitter Windows 10 Proxy Server Regulation Marketing Office Users Office Tips CrashOverride Quick Tips Managing Stress

Latest Blog

You know just how essential your company’s IT is, but do you have any idea how your employees feel about the technology you provide them? In order to get the productivity your company needs out of your staff, meeting their computing needs becomes a fundamental requirement. T...

Latest News

Decatur Computers Inc. is proud to announce the launch of our new website at http://www.decaturcomputers.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.