• Facebook
  • Twitter
  • Linkedin
  • Instagram
  • FAQs
  • Careers
  • Privacy Policy
  • Remote Support
The ITeam
  • Home
  • Services
    • Managed IT Services
    • Cybersecurity
      • Email Security
      • Security Training
    • On Demand IT Services
    • Cloud Services
      • BCDR
      • Hosted Services
      • Microsoft Azure
      • Office 365
  • Industry
    • Construction
    • Healthcare
    • Oil & Gas
    • Legal Firm
    • Accounting
    • Clients & Achievements
  • Your ITeam
  • Blog
    • News
  • Contact Us
  • Menu
  • Home
  • Services
    • Managed IT Services
    • Cybersecurity
      • Email Security
      • Security Training
    • On Demand IT Services
    • Cloud Services
      • BCDR
      • Hosted Services
      • Microsoft Azure
      • Office 365
  • Industry
    • Construction
    • Healthcare
    • Oil & Gas
    • Legal Firm
    • Accounting
    • Clients & Achievements
  • Your ITeam
  • Blog
    • News
  • Contact Us

Blog

Social Engineering (An IT Security Threat)

Social Engineering (An IT Security Threat)

October 26, 2016/0 Comments/in Security Alert /by James Wagner

What is Social Engineering?

Social Engineering (An IT Security Threat)

Social engineering is an IT security threat in which psychological manipulation is used to trick people into divulging information that should not be provided.

And criminals who implement social engineering scams are patient.

They will work slowly to gather all of the data they need, accessing information on a company’s website, as well as on personal and professional social media profiles.

They will even phone a company to surreptitiously gather necessary information.

This information is then used to perpetrate scams that are so well-developed that they seem legitimate.

Social Engineering in Organizational Setting

Social engineering in the organizational setting is used to create more effective spear phishing emails.

Specific people in the organization are targeted (based on the research gathered) to successfully trick recipients into wiring money, releasing password information, or clicking on links that result in ransomware threatening your network.

Why Is Social Engineering So Successful?

By doing a little more homework, cybercriminals are able to craft email messages that elicit an emotional response from the recipient.

Common tactics include:

  • Posing as the CEO and expressing displeasure to someone in the finance department in regards to an unpaid invoice. The ensuing fear response over being in trouble with the boss may cause that person to wire money without ensuring that the invoice is real.
  • Pretending to be a colleague who desperately needs information to finish a project. The sense of urgency created can cause the recipient to divulge the information without making sure the sender was really who they claimed to be.
  • Pretending to be a vendor, coworker, or boss who needs something done quickly that would require opening a file or clicking on a link.

In each case, the success of the attack comes from knowledge.

The criminal knows enough about the sender to make the request seem legitimate while creating a false sense of urgency or fear to cause an immediate response (click the link, send the money, provide the secure information).

There’s No App for Human Error

Security is about trust.

Do you know who you’re communicating with?

Do you know where you’re really sending money or information to when responding to email messages?

Every organization struggles with addressing the one gap in security they can’t patch with software or an app: the human element.

How To Prevent Social Engineering

So how do you help your employees avoid being exploited by social engineering scams?

First, you keep as much of the email from reaching them as possible. Then, you hold employees accountable for having restraint.

  1. Implement firewalls and virus protectors as a first-layer solution.
  2. Add threat detection and malware detection to sift out more attacks.
  3. Use a hosted email solution and email security protocols that keep the worst of the attacks from reaching the recipients.
  4. Train your employees (and train them again, and again). Download our email security guide.
  5. Establish policies to prevent immediate actions that might compromise security:
    1. Require two people to authorize a wire transfer.
    2. Have strict policies regarding what kind of information can be transmitted by email; require the recipient to verify by phone and provide the information by phone if legitimate, to avoid data loss.
    3. Require stringent employee passwords that are changed regularly.
    4. Limit information access to only essential personnel.
    5. Have offsite data backup and recovery solutions so that if the worst does happen, you can quickly recover and minimize downtime for your customers.
  6. Hold employees accountable for breaching policies designed to prevent such attacks from succeeding.

The ITeam is dedicated to helping Calgary- and Alberta-based businesses avoid these sophisticated attacks. We do this by providing essential IT support and customized services designed to meet the needs of your business. The ITeam will work with you to develop a cost-effective and comprehensive flat-rate IT strategy that will help you thrive. Contact us for a free consultation.

Tags: calgary cybersecurity, social engineering
Share this entry
  • Share on Facebook
  • Share on Twitter
  • Share on Pinterest
  • Share on Linkedin
  • Share on Reddit
  • Share by Mail
You might also like
Canada Is A World Leader in Cybersecurity
What Can Data Breaches Teach Us About Cybersecurity
The Future of Cybersecurity in Canada
Think Like a Hacker to Improve Your Cybersecurity
3 Important Steps To Improve Your Cybersecurity in Canada
4 Tips on Building a Better Cybersecurity Strategy
0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Categories

  • Asset Management
  • Azure
  • BDR
  • Business Continuity
  • Cloud Hosting
  • Cloud Security
  • Compliance
  • Cybersecurity
  • Dental IT
  • Disaster Recovery
  • Email Security
  • Energy IT
  • IoT Security
  • Legal IT
  • Managed IT
  • Mobile Device Management
  • Multifactor Authentication
  • Network Assessment
  • News
  • Office 365
  • Security Alert
  • Small Business IT
  • VCIO

Pages

  • Accounting Firms & Accountants
  • Aruba Networks
  • Blog
  • Business Assesment
  • Careers
  • Clients & Achievements
    • Kemp Orthodontics
    • The Power of Partnership – Wood Group
  • Cloud Services
    • Business Continuity & Disaster Recovery (BCDR)
  • Construction
  • Contact
  • Cybersecurity
  • Email Security
  • Healthcare Clients
  • Hosted Services
  • How to Get the Most from a Managed IT Services Provider
  • IT Development for the Canadian Business
  • IT Services Calgary
  • IT Services FAQ
  • Legal Firm
  • Managed IT Services
  • Managed IT Services in Calgary
  • Microsoft Azure
  • News
  • Office 365
  • Oil & Gas
  • On Demand IT Services
  • Privacy Policy
  • Security Training
  • support
  • Terms Of Service
  • Thank You
  • When is Your Business Ready for Managed IT Services
  • Why setting up a business in Calgary Is a Good Idea
  • Your ITeam

Archives

  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • October 2016
  • September 2016
  • August 2016
  • July 2016
  • June 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • September 2015
  • August 2015
  • July 2015
  • June 2015
  • May 2015
  • March 2015
  • February 2015
  • January 2015
  • December 2014

CONTACT US

Sales: (403) 750-2540
General Inquiry: (403) 237-7750
Service & Support: (403) 750-2525

Sales Email: sales@theiteam.ca
General Email: info@theiteam.ca
Service & Support: support@theiteam.ca

FIND US

The ITeam IT Support Calgary
Suite 200, 1210 8 Street SW
Calgary, AB T2R 1L3
(403) 750-2540

Office Hours:
Monday to Friday: 8AM to 5PM
(Mountain Standard Time)

OUR SERVICES

  • Managed IT Services
  • On Demand IT Services
  • Hosted Services
  • Clients & Achievements
LinkedIn | FB | Twitter | Instagram
Privacy Policy
Copyright © 2019 The iTeam.ca | All Rights Reserved - Enfold WordPress Theme by Kriesi
  • Facebook
  • Twitter
  • Linkedin
  • Instagram
The Benefits of Flat Rate IT Services 3 Steps To Ensure Continued IT Reliability and Security For Your Business 3 Steps To Ensure Continued IT Reliability and Security For Your Business
Scroll to top

This site uses cookies. By continuing to browse the site, you are agreeing to our use of cookies.

OK