{"id":6012,"date":"2016-11-22T16:40:31","date_gmt":"2016-11-22T08:40:31","guid":{"rendered":"http:\/\/staging.bankvaultonline.com\/?p=6012"},"modified":"2016-11-22T16:40:31","modified_gmt":"2016-11-22T08:40:31","slug":"5-ultimate-social-engineering-prevention-techniques","status":"publish","type":"post","link":"https:\/\/www.bankvault.com\/5-ultimate-social-engineering-prevention-techniques\/","title":{"rendered":"5 Ultimate Social Engineering Prevention Techniques"},"content":{"rendered":"
Social engineering is a ‘deadly’ art form which relies on persuasive psychology to manipulate victims to give up confidential information. Social engineers (the perpetrators) seek various types of information to deceive you into providing your confidential information such as banking details, passwords, and other information. They may also secretly install malicious software onto your computer which gives them control over your computer without you even knowing.<\/p>\n
These scam artists use social engineering techniques to exploit people’s natural inclination to trust others. In general, it is much easier to trick someone into giving you their password than it is to\u00a0guess their password unless the password is weak.<\/p>\n
Even though cyber attacks may occur, the IT Department is not always to blame. While cyber security does rely on great anti hacking software, cyber security is also about actually taking in those tips and knowing whom and what to trust. Whether it’s a scam via the phone or on the internet – humans are the weakest link in the security chain. All the deadlocks and security alarm systems in the world cannot save you if you shout your passwords loudly across the office or put them on sticky notes for all to see.<\/p>\n
Here are the 5 ultimate social engineering techniques that actually work to fool unsuspecting victims:<\/p>\n
(Editor\u2019s Note:<\/strong> If you manage your company\u2019s payroll or do any other type of online banking you\u2019ll want to read and understand this.)<\/em><\/p>\n <\/a><\/p>\n Called by many as the \u2018cornerstone of social engineering\u2019 the familiarity exploit succeeds because the social engineer does a good job of convincing the people around him\/her that he\/she should be there \u2014 in this case walking the halls of an office with physical access to company work stations and computers.<\/p>\n People are far more willing to give assistance and information to those they recognize and know \u2014 even if only little. That familiar person, in the eyes of the target, doesn\u2019t set off any alarm bells about who that person is and why that person is wandering the office.<\/p>\n Social engineers do this in many ways but mainly it involves physically getting into a targeted business and getting your targets familiar with your presence and personality. In larger companies, social engineers have been known to gain access by \u2018tailgating\u2019 (sliding in behind a large group as it goes through a secure door) and then pretending to be a company consultant.<\/p>\n In one well known hacking case at a major New York financial services company, a hacker spent 2 days \u2018working\u2019 in one of the target company\u2019s conference room. After he felt recognition and trust he struck: inserting a USB with key loggers and other malware into 5 company computers. Once the malware was installed he left, now free to strike from a distance at optimal time.<\/p>\n The larger the office, the harder it is to protect oneself against this technique. Having said that, you can protect your business from it by frequently checking visitors and foreign faces to see if they have a legitimate reason to be in the office.<\/p>\n But remember, once the social engineer has succeeded in infecting even one company workstation, access to private financial data through the company network is not too far off.<\/p>\n <\/p>\n <\/p>\n Social engineering is a term that describes how a hacker uses psychology and human emotion to gain access to a computer network. This technique preys on mankind\u2019s fundamental, \u2018cognitive laziness\u2019 in a negative way.<\/p>\n The \u2018hostile situation\u2019 technique draws its considerable strength from the fact that people have a deep seated urge to withdraw from conflict \u2013 and from those who appear angry or upset.<\/p>\n Simply put, if you are angry people are much less likely to stop you. In fact, some studies have shown that people are more likely to heed the request from an angry person over a nice person. The urge to avoid conflict it that ingrained.<\/p>\n It\u2019s a diversionary tactic that leverages that need to withdraw from negativity by manufacturing and bringing a hostile situation to a person managing access to a place, room, building, etc…, hoping that, in an effort to avoid the situation, a security guard will just wave the person through.<\/p>\n One example would be to pretend to be on the phone having a heated argument as one passes through a situation where, under calm circumstances, one\u2019s presence might be stopped and verified. Like an office building checkpoint.<\/p>\n The \u2018hostile situation\u2019 technique been around for centuries for one simple reason: it works. Be sure your employees are aware of it.<\/p>\n <\/p>\n <\/a><\/p>\n Social engineering is all about gathering the bits and pieces of information that, when pulled together, give a hacker the ability to break into a system and hack it. Much of social engineering revolves around how a hacker gets the access to be able to steal information. But, an equally large part of social engineering are how a hacker uses public spaces and sources of information to compile the personal profiles they need to break into a system.<\/p>\n To put it another way, the more information one has about their \u2018mark\u2019 the faster one will be able to exploit the mark. If you review the history of social engineered hacks you\u2019ll find a lot of old-fashioned, offline work.<\/p>\n#2 Hostile Situation<\/h3>\n
#3 Offline Information Gathering<\/h3>\n