(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Would Your Users be Tricked by Social Engineering?

The term social engineering may not seem nearly as intimidating as other cybersecurity terms like ransomware or denial of service. Don’t be deceived! Some of the biggest threats to your company’s data and network security use social engineering to manipulate targets into taking a specific action - like disclosing personal information that can be stolen and exploited.

Often overlooked by the media in favor of major data breach events, there are few types of social engineering hacks that have the capability to devastate a business.

  1. Vishing: Given the fact that the number of people who fall for phishing attacks and other email scams has declined significantly, it was only a matter of time before hackers found an alternative avenue to exploit their targets. After abandoning it a few years ago in favor to digital scams, vishing - a fraudulent voice call that seeks personal information - have once again returned as a favorite among hackers and thieves.
  2. HTTPS: SSL certificates used to ensure that a website was legitimate and secure enough to protect your personal information. Websites that have ‘https’ no longer signifies security, as hackers have begun using websites that give away SSL certificates for free and using them to lull victims into a false sense of security. To make sure a website is secure, you’ll want to look for indication of an extended validation SSL (EV-SSL) which are not offered for free! EV-SSLs are signified with a green bar.
  3. Website Copy-Cats: Scammers have become very skilled at making spoof websites that look and feel just like the authentic website but are actually littered with all typesof malware. For example, after the Equifax data loss event in June 2017, Equifax set up a website to help their clients who had their information compromised with the URL: equifaxsecurity2017.com. A spoof of that website, with the domain securityequifax2017.com, was so convincing - it even tricked Equifax themselves! A few things to keep an eye out for when trying to determine if a website is legitimate, include:
    1. Make sure the URL is correct.
    2. Avoid giving out information unless a site has an EV-SSL.
    3. Look for seals of trust from other IT security websites.
    4. Beware of misspellings, typos and broken English.
  4. Every Word Password Theft: There are a lot of hacking tools that will scan through databases - including every word in the dictionary. These tools significantly increase the likelihood that a password that includes an actual word will be cracked and exploited. The best practices are ones that mix numbers, letters and symbols that make no sense.

When it comes to digital threats, for every exploit or hack that is prevented, a few, more advanced ones are developed. The best way to keep your business, and it’s data, safe is to take proactive measures and execute safe internet practices all times - and that goes for your employees, as well! Would you like to learn more about how you can stay ahead of hackers? Call us at NTConnections.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, 13 December 2017

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Privacy Hackers Business Computing Productivity Microsoft Backup Malware Hosted Solutions Internet Google Efficiency Mobile Devices IT Support Business VoIP Miscellaneous IT Services Managed Service Provider Server Disaster Recovery Business Continuity Workplace Tips Email Network Innovation Data Upgrade Software Windows Hardware Communication Computer Save Money Saving Money Business Management Mobile Device Management Smartphones User Tips Managed IT Services Microsoft Office Virtualization Browser Network Security Windows 10 WiFi Smartphone Holiday Android communications BYOD Social Media Data Backup Operating System Outsourced IT Mobile Computing Hacking Chrome Small Business Application Apple Proactive IT Remote Monitoring Avoiding Downtime Computers IT Solutions Cybercrime Alert Quick Tips Automation Information Technology Ransomware Passwords Social Engineering Office Marketing Budget Collaboration The Internet of Things Big Data spam Managed IT Services Recovery Going Green Remote Computing Health Employer-Employee Relationship Mobility VPN Bring Your Own Device Managed IT iPhone Gadgets Save Time Firewall Cybersecurity Data Recovery Telephone Systems App Wireless Technology User Error Vendor Management Website Excel Redundancy Phone System Antivirus Content Filtering Cloud Computing IT Support Downtime Office 365 Two-factor Authentication History Tablet Analytics Router Windows 10 Memory Retail Search Office Tips Bandwidth Compliance Artificial Intelligence Networking Gmail Lithium-ion battery BDR Private Cloud How To Mouse PowerPoint Outlook Printer Meetings HaaS Money Fax Server Flexibility Black Market Law Enforcement Current Events Data Management Solid State Drive Administration Internet of Things Maintenance Entertainment Data Storage Running Cable Internet Exlporer Value Word Data storage Biometrics Unified Threat Management Business Intelligence Skype Business Owner Mobile Office Customer Relationship Management Intranet Hard Drives IT Management Best Available People Work/Life Balance Facebook Programming Network Congestion Trending Physical Security DDoS IT Consultant Robot Apps Unsupported Software Environment Google Drive Public Cloud Humor Phishing Saving Time Statistics Vulnerability Document Management SaaS Risk Management Data Security Online Currency Safety Government Crowdfunding Cleaning Customer Service HBO Mobile Entrepreneur Multi-Factor Security Screen Mirroring Tech Support Frequently Asked Questions Professional Services Print Server Hacker Cost Management Windows Media Player Computer Fan Lifestyle Cast Shadow IT Applications Tip of the week Tools Wireless Files Science Instant Messaging FENG Data Protection Net Neutrality Hiring/Firing Productivity Computer Repair Streaming Media Wi-Fi Shortcut WIndows 7 Windows Server 2008 Workers SharePoint Colocation Windows 8 Comparison Encryption Windows 7 Sports Bluetooth Managing Stress Botnet Monitor Hosted Solution eWaste Computing Infrastructure Tablets Virus OneNote Specifications Touchscreen Data Warehousing LinkedIn Notifications Regulations YouTube USB Travel Debate Reputation Wearable Technology End of Support Social Computer Accessories Millennials Servers NarrowBand Customers Internet exploMicrosoft Best Practice Social Networking Cameras Root Cause Analysis Workforce IT Plan Video Surveillance Flash Chromecast Consultant Analyitcs Software as a Service Education Patch Management Advertising Printer Server Data loss Sync Laptop Settings Worker Commute Update Piracy Scam Distributed Denial of Service Virtual Desktop Software Tips Telephony Touchpad IT service Human Resources User Virtual Reality Google Docs Company Culture Licensing Relocation Hybrid Cloud Windows 8.1 Update Samsung Uninterrupted Power Supply Training Computer Care Twitter Start Menu HIPAA Domains Bloatware Spam Blocking Voice over Internet Protocol Audit IaaS Loyalty Conferencing Keyboard Windows 10s Smart Technology Battery Experience Two Factor Authentication Assessment Music Users Password Television Troubleshooting Electronic Medical Records Techology Public Computer Employer Employee Relationship Legal Data Breach Automobile Emails Books Mobile Device CrashOverride IBM Webinar Emergency Worker Supercomputer Content IT solutions Video Games Telecommuting Rootkit Knowledge Audiobook Netflix Scalability Remote Work Charger Politics Transportation How to webinar Benefits PDF