(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Would Your Users be Tricked by Social Engineering?

Would Your Users be Tricked by Social Engineering?

The term social engineering may not seem nearly as intimidating as other cybersecurity terms like ransomware or denial of service. Don’t be deceived! Some of the biggest threats to your company’s data and network security use social engineering to manipulate targets into taking a specific action - like disclosing personal information that can be stolen and exploited.

Often overlooked by the media in favor of major data breach events, there are few types of social engineering hacks that have the capability to devastate a business.

  1. Vishing: Given the fact that the number of people who fall for phishing attacks and other email scams has declined significantly, it was only a matter of time before hackers found an alternative avenue to exploit their targets. After abandoning it a few years ago in favor to digital scams, vishing - a fraudulent voice call that seeks personal information - have once again returned as a favorite among hackers and thieves.
  2. HTTPS: SSL certificates used to ensure that a website was legitimate and secure enough to protect your personal information. Websites that have ‘https’ no longer signifies security, as hackers have begun using websites that give away SSL certificates for free and using them to lull victims into a false sense of security. To make sure a website is secure, you’ll want to look for indication of an extended validation SSL (EV-SSL) which are not offered for free! EV-SSLs are signified with a green bar.
  3. Website Copy-Cats: Scammers have become very skilled at making spoof websites that look and feel just like the authentic website but are actually littered with all typesof malware. For example, after the Equifax data loss event in June 2017, Equifax set up a website to help their clients who had their information compromised with the URL: equifaxsecurity2017.com. A spoof of that website, with the domain securityequifax2017.com, was so convincing - it even tricked Equifax themselves! A few things to keep an eye out for when trying to determine if a website is legitimate, include:
    1. Make sure the URL is correct.
    2. Avoid giving out information unless a site has an EV-SSL.
    3. Look for seals of trust from other IT security websites.
    4. Beware of misspellings, typos and broken English.
  4. Every Word Password Theft: There are a lot of hacking tools that will scan through databases - including every word in the dictionary. These tools significantly increase the likelihood that a password that includes an actual word will be cracked and exploited. The best practices are ones that mix numbers, letters and symbols that make no sense.

When it comes to digital threats, for every exploit or hack that is prevented, a few, more advanced ones are developed. The best way to keep your business, and it’s data, safe is to take proactive measures and execute safe internet practices all times - and that goes for your employees, as well! Would you like to learn more about how you can stay ahead of hackers? Call us at NTConnections.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 18 February 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Privacy Hackers Business Computing Productivity Microsoft Backup Hosted Solutions Malware Internet Google Mobile Devices Efficiency VoIP IT Support Business Email Miscellaneous IT Services Managed Service Provider Innovation Server Workplace Tips Disaster Recovery Business Continuity Network Data Windows Upgrade Business Management Software Hardware Network Security Communication Computer Save Money Saving Money Mobile Device Management Virtualization Android Smartphones Microsoft Office User Tips communications Managed IT Services Holiday Browser Smartphone Data Backup Outsourced IT WiFi Windows 10 Computers Small Business BYOD Cybercrime Hacking Chrome Social Media Remote Monitoring Operating System Mobile Computing Alert Apple Proactive IT Big Data Avoiding Downtime Application Managed IT Services IT Solutions Social Engineering Data Recovery Office Quick Tips Budget Collaboration Employer-Employee Relationship Information Technology Passwords Marketing Automation Cloud Computing Ransomware The Internet of Things Telephone Systems BDR Mobility Health Gadgets Bring Your Own Device VPN spam Going Green Remote Computing Recovery Vendor Management App Gmail iPhone Cybersecurity Wireless Technology User Error Private Cloud How To Save Time Two-factor Authentication Firewall Managed IT Internet of Things Bandwidth Compliance Networking Lithium-ion battery Antivirus Vulnerability Analytics Router Data Security Mouse PowerPoint Website Redundancy Excel Phone System Content Filtering Money Office 365 Downtime Artificial Intelligence Data Management History Tablet Value IT Support Business Intelligence Retail Memory Search Office Tips Document Management Windows 10 Risk Management Online Currency Facebook People Business Owner Programming OneNote Network Congestion IT Plan Printer Trending Physical Security DDoS CES Robot Unsupported Software Work/Life Balance Google Drive Current Events Environment Humor Maintenance Human Resources Statistics SaaS Training Identity Theft Safety Government Public Cloud Outlook Credit Cards Meetings Phishing HaaS Intranet Flexibility Fax Server HIPAA Black Market Administration Data Storage Entertainment Internet Exlporer Running Cable Word Data storage Law Enforcement Unified Threat Management IT Consultant Biometrics Skype Solid State Drive Apps eWaste Mobile Office Customer Relationship Management Saving Time Hard Drives Workers Best Available IT Management NarrowBand Wireless Charging Servers Hosted Solution Customers Computing Infrastructure Criminal Cameras Social Networking Workforce Video Surveillance Legal Best Practice Chromecast Consultant Fiber-Optic Flash Education Software as a Service End of Support Analyitcs Printer Server Telecommuting Mobile Device Laptop Settings Print Server Cables Sync Piracy Update Internet exploMicrosoft Distributed Denial of Service Worker Commute Content Management Virtual Desktop Root Cause Analysis Remote Work Software Tips Touchpad User IT service Unified Communications Telephony Licensing Google Docs Patch Management Relocation Advertising Net Neutrality Computer Repair Blockchain Virtual Reality Data loss Samsung Uninterrupted Power Supply Domains Twitter Theft Start Menu Voice over Internet Protocol Scam Audit IaaS Staff Bloatware Cleaning Customer Service Charger Crowdfunding HBO Cortana Mobile Entrepreneur Multi-Factor Security Screen Mirroring Hybrid Cloud Touchscreen Tech Support Fraud Computer Care Frequently Asked Questions Google Apps Hacker Professional Services Cost Management Spam Blocking Lifestyle Cast Windows Media Player Shadow IT Amazon Tip of the week Tools Keyboard Wireless Infrastructure Science Instant Messaging Hiring/Firing Data Protection Streaming Media WIndows 7 Shortcut Amazon Web Services Windows Server 2008 SharePoint Password Manager Windows 8 Computer Fan Comparison Encryption Sports Managing Stress Online Shopping Bluetooth Windows 7 Applications Botnet Monitor Files Business Mangement Tablets Virus FENG Specifications Productivity LinkedIn Data Warehousing Password Notifications YouTube Evernote USB Regulations Wi-Fi Debate Travel Reputation Colocation Company Culture Wearable Technology Recycling Computer Accessories Windows 8.1 Update Social Millennials Electronic Medical Records Public Computer Employer Employee Relationship Data Breach Automobile Emails Books CrashOverride IBM Webinar Emergency Worker Content Supercomputer IT solutions Users Rootkit Video Games Audiobook Knowledge Netflix Scalability Politics Transportation Digital Signature How to webinar Benefits PDF Loyalty Conferencing Windows 10s Smart Technology Battery Experience Two Factor Authentication Assessment Music Television Troubleshooting Techology