(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Would Your Users be Tricked by Social Engineering?

Would Your Users be Tricked by Social Engineering?

The term social engineering may not seem nearly as intimidating as other cybersecurity terms like ransomware or denial of service. Don’t be deceived! Some of the biggest threats to your company’s data and network security use social engineering to manipulate targets into taking a specific action - like disclosing personal information that can be stolen and exploited.

Often overlooked by the media in favor of major data breach events, there are few types of social engineering hacks that have the capability to devastate a business.

  1. Vishing: Given the fact that the number of people who fall for phishing attacks and other email scams has declined significantly, it was only a matter of time before hackers found an alternative avenue to exploit their targets. After abandoning it a few years ago in favor to digital scams, vishing - a fraudulent voice call that seeks personal information - have once again returned as a favorite among hackers and thieves.
  2. HTTPS: SSL certificates used to ensure that a website was legitimate and secure enough to protect your personal information. Websites that have ‘https’ no longer signifies security, as hackers have begun using websites that give away SSL certificates for free and using them to lull victims into a false sense of security. To make sure a website is secure, you’ll want to look for indication of an extended validation SSL (EV-SSL) which are not offered for free! EV-SSLs are signified with a green bar.
  3. Website Copy-Cats: Scammers have become very skilled at making spoof websites that look and feel just like the authentic website but are actually littered with all typesof malware. For example, after the Equifax data loss event in June 2017, Equifax set up a website to help their clients who had their information compromised with the URL: equifaxsecurity2017.com. A spoof of that website, with the domain securityequifax2017.com, was so convincing - it even tricked Equifax themselves! A few things to keep an eye out for when trying to determine if a website is legitimate, include:
    1. Make sure the URL is correct.
    2. Avoid giving out information unless a site has an EV-SSL.
    3. Look for seals of trust from other IT security websites.
    4. Beware of misspellings, typos and broken English.
  4. Every Word Password Theft: There are a lot of hacking tools that will scan through databases - including every word in the dictionary. These tools significantly increase the likelihood that a password that includes an actual word will be cracked and exploited. The best practices are ones that mix numbers, letters and symbols that make no sense.

When it comes to digital threats, for every exploit or hack that is prevented, a few, more advanced ones are developed. The best way to keep your business, and it’s data, safe is to take proactive measures and execute safe internet practices all times - and that goes for your employees, as well! Would you like to learn more about how you can stay ahead of hackers? Call us at NTConnections.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 25 May 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Privacy Best Practices Hackers Business Computing Hosted Solutions Productivity Microsoft Internet Malware Backup Google Mobile Devices Efficiency VoIP Business IT Support Email IT Services Network Security Miscellaneous Managed Service Provider Innovation Server Data Workplace Tips Disaster Recovery Business Continuity Network Business Management Software Windows Upgrade Hardware Communication Saving Money Android Mobile Device Management Virtualization Computer Smartphone Browser Managed IT Services Save Money User Tips Data Backup Smartphones communications Microsoft Office Holiday Cybercrime BYOD Windows 10 Outsourced IT WiFi Computers Hacking Chrome Big Data Ransomware Small Business Data Recovery Social Media Remote Monitoring Operating System Mobile Computing Cloud Computing Alert Application Apple Automation Proactive IT Avoiding Downtime Collaboration IT Solutions VPN Managed IT Services Internet of Things Quick Tips Social Engineering Information Technology BDR Employer-Employee Relationship Passwords Office Marketing Budget The Internet of Things Recovery Tech Term spam Gadgets Cybersecurity Telephone Systems Bandwidth Managed IT Going Green Remote Computing Health Mobility Bring Your Own Device Data Protection Vendor Management Business Intelligence Website iPhone Save Time Firewall App Router Gmail Private Cloud Compliance How To Vulnerability Data Security Artificial Intelligence Redundancy Wireless Technology User Error IT Support Two-factor Authentication Document Management Productivity Risk Management PowerPoint Windows 10 Excel Phone System Antivirus Money Office Tips Content Filtering Downtime History Tablet Analytics Lithium-ion battery Value Memory Retail Search Phishing Identity Theft Mouse Networking Apps Office 365 Law Enforcement Data Management Streaming Media Data Storage Internet Exlporer Online Currency Workers Word Data storage Encryption Biometrics Comparison Business Owner Outlook Printer eWaste OneNote Flexibility Hard Drives Mobile Device Current Events IT Management Work/Life Balance Facebook Administration Maintenance Entertainment Smart Tech IT Plan Running Cable CES Physical Security DDoS Unsupported Software Unified Threat Management Robot Data loss Skype Mobile Office Environment Update Google Drive Public Cloud Customer Relationship Management Intranet Human Resources SaaS Training Best Available People Safety HIPAA Programming Government Cleaning Network Congestion Credit Cards Trending Meetings HaaS IT Consultant Fax Server Black Market Solid State Drive Applications Humor Infrastructure Saving Time Statistics Password Instant Messaging Analysis Company Culture Licensing FENG Windows 8.1 Update Samsung Windows Server 2008 Wi-Fi Shortcut Nanotechnology Amazon Web Services Twitter Windows 8 Password Manager SharePoint Colocation Accountants Electronic Medical Records Crowdfunding Windows 7 Sports Connectivity Bluetooth Online Shopping Tablets Business Mangement Botnet Monitor Hosted Solution Computing Infrastructure Notifications Legal Specifications Data Warehousing Regulations YouTube Devices USB Evernote Recycling Travel Print Server Reputation Wearable Technology End of Support Windows Media Player Social IoT Millennials Servers NarrowBand Wireless Charging Criminal Customers Internet exploMicrosoft Best Practice Social Networking Net Neutrality Hiring/Firing Root Cause Analysis Workforce Thought Leadership Computer Repair Fiber-Optic Flash Chromecast WIndows 7 Analyitcs Software as a Service Patch Management Advertising Insurance Telecommuting Content Filter Cables Sync Laptop Managing Stress Settings Content Management Scam Distributed Denial of Service Charger Software Tips Virus Virtual Desktop Practices Touchscreen Remote Work Storage LinkedIn Unified Communications Telephony Touchpad IT service Hybrid Cloud Virtual Reality Blockchain Debate Google Docs Relocation Computer Care Uninterrupted Power Supply Computer Accessories Hosted Computing Addiction Theft Start Menu Domains IaaS PDF Bloatware Staff Spam Blocking Voice over Internet Protocol Audit Video Surveillance HBO Cameras Customer Service Inventory Cache Cortana Mobile Keyboard Consultant Entrepreneur Digital Signature Education Multi-Factor Security Screen Mirroring Frequently Asked Questions Tech Support Printer Server Access Control Fraud Wireless Internet Hacker Google Apps Professional Services Worker Commute Cost Management Strategy Piracy Computer Fan Lifestyle Cast Tip of the week Shadow IT Authentication Amazon Science Tools User Wireless Files Television Troubleshooting Techology Public Computer Employer Employee Relationship Data Breach Automobile Emails Books CrashOverride IBM Webinar Emergency Users Worker Supercomputer Content IT solutions Video Games Rootkit Knowledge Audiobook Netflix Scalability Politics Transportation How to webinar Benefits Loyalty Conferencing Windows 10s Smart Technology Battery Experience Two Factor Authentication Assessment Wire Music