SlideShare a Scribd company logo
1 of 15
THE EMOTIONAL LURE OF
SOCIAL ENGINEERING
Social engineering can sound quite alluring
to some. The word “social” tends to have a
positive connotation as it relates to our
personal and professional lives. Put the
word engineering after it and it might
remind you to call some of your IT friends
and schedule a night out. Unfortunately,
social engineering in the cyber world is
vastly different.
WHAT IS SOCIAL
ENGINEERING?
So, what is social engineering? It is the art of
manipulating others to release confidential
information. Cyber criminals are focusing on the
trusting nature of others verses weaknesses in their
technology infrastructure. Especially since their tactics
can be so appealing that employees willingly provide
passwords or information needed to access their
company’s systems. This is all done without any
knowledge that they have just been exploited. It is an
art, and educating your employees is vital.
WATCH OUT!
It is important that employees are aware of the types of
attacks that are out there. To take it a step further,
they should look at all types of correspondence with a
suspicious eye. Below are some common social
engineering attacks, but be aware that hackers are
always one step ahead of the game. One attack today
may be surpassed by another tomorrow.
The most common forms of social engineering include
spear phishing, baiting, quid pro quo, and email
attachments from a so-called friend.
PHISHING SCHEMES
If you are a committed reader of our blogs, you have
come across phishing schemes more than a few
times. Phishing is the leading form of social
engineering attacks typically delivered in the form of
email from a (seemingly) trustworthy source. Cyber
criminals may claim that the end user is the “winner” of
a grand prize or may ask for a charitable donation
after a nationwide disaster or tragedy takes place
(wiring instructions are fully intact). Regardless, these
types of scams vary in their complexity and their
attacker’s objectives, with spear phishing and whaling
attacks being the more sophisticated forms of
phishing.
PHISHING
SCHEMES
Spear phishing is a tactical approach that
uses an email that appears to come from a
business or someone that you know; but in
reality, is malicious and seeks to obtain
sensitive information (bank account
numbers, passwords, financial information,
etc.) in a timely manner. Pretexting is
similar to spear phishing but instead of
focusing on “urgency” it relies on building a
false sense of trust with the end user by
impersonating a co-worker or employer to
gain sensitive information. Additionally,
whaling refers to going after a potentially
large target – generally Executives or high-
level accounting professionals who have the
ability to authorize large transactions.
PHISHING SCHEMES
Spoofing uses e-mail sent from
spoofed or similar-sounding domain
names to make it appear as though
these emails were sent from senior
executives of a victim’s company. This
tactic is often used in conjunction with
spear phishing in order to add the
appearance of legitimacy.
To avoid these damaging attacks, click
here to learn guidelines and general
rules to follow to stay protected.
BAITING
Baiting is similar to phishing but it involves
enticing the end user with something of
interest in exchange for private data. Baiters
may offer users free music or movie
downloads, if they surrender their personal
login credentials. What better way to pass
time at work than with free music, right?
Baiting can also come in physical forms,
such as a corporate branded flash drive that
is labeled with something directly related to
your work or department. The most
documented baiting attack occurred in 2006
and is still relevant today as the USB is still
alive and kicking in the workplace. In this
case, USBs were intentionally infected and
disbursed in the employee parking lot of
their financial employer. Have you ever
heard the term, “curiosity killed the cat?”
EMAIL
ATTACHMENTS
FROM A
“FRIEND”
If a hacker can break into your
email, they can access your
contents and send malicious
email from someone that you
know. Recently there have been
some issues regarding potential
malicious attachments in email.
These malicious emails vary in
subject and are usually titled to
draw attention (IRS, invoices,
billing, etc.). Anything that is
asking you to perform additional
actions / tasks should be
considered more carefully. In
today’s world, you should work
under the guise that all
attachments are hostile until
proven otherwise.
EMAIL ATTACHMENTS FROM
A “FRIEND”
One of the most common means by which a computer is
compromised is through email attachments. When
opened, these attachments can give hackers complete
control of your machine and in turn, control over other
machines in your environment, servers and networks.
HERE ARE
A FEW
GUIDELINE
S TO
FOLLOW AS
IT RELATES
TO EMAIL
ATTACHME
NTS
1. Don’t open “surprise attachments” (something that you
are not expecting).
2. If you don’t know the person sending the attachment,
don’t open it.
3. Only open attachments with recognizable file
extensions, i.e., excel, word (avoid .exe, .pif, .scr,
.docm, .lotterywinner, etc.)
4. Don’t open attachments to emails that appear
incomplete, incoherent, or simply “look wrong.”
5. Zip and PDF files should be looked at with scrutiny prior
to opening as they are key players in transferring
malicious content.
6. If you are unsure of the attachment, don’t open it.
These threats are mitigated by your spam filter, however no
spam solution is foolproof. Mail attachments should be
treated with a degree of caution. Everyone is fair game no
matter how big or small your company is.
QUID PRO QUO
I give you something and you give me something and we
are even. Not so fast. If you are contacted at work and
told that you will receive a gift card for $500 if an IT
specialist can scan your network if you provide the
credentials, it’s too good to be true. Please note that the
most common type of Quid Pro Quo attacks are hackers
that impersonate IT people. There are less sophisticated
forms of attack that involved free chocolate and
passwords. This attack may be dated back to 2004, but
our love of chocolate remains in all of us, consider this a
friendly reminder.
“IF I EDUCATE MY
EMPLOYEES I SHOULD BE
GOOD RIGHT?”
As noted, educating your employees of the latest
attacks and what to look out for is extremely
important. However, locking down your networks
should not be taken lightly. It is important to make
any form of hacking as difficult as possible.
WORKING WITH A REPUTABLE
MANAGED SERVICE PROVIDER
(MSP) WILL ENSURE THE
FOLLOWING:
Software updates are installed on all computers when
released
Network security is managed through anti-virus software
and other features that prevent unauthorized access
Managed backup and disaster recovery (BDR) solution is
in place
Anti-spam filters are put in place to eliminate certain
emails before they even get to your end users
These services are extremely important to the health of
your business. Proper network security minimizes
downtime and revenue lost. To ensure that your
network is properly secure, contact The TNS Group
today and reduce your risks of a cyberattack.

More Related Content

What's hot

Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...ABHAY PATHAK
 
Social engineering tales
Social engineering tales Social engineering tales
Social engineering tales Ahmed Musaad
 
Prevent phishing scams
Prevent phishing scamsPrevent phishing scams
Prevent phishing scamsronpoul
 
Cyber security.docx
Cyber security.docxCyber security.docx
Cyber security.docxsaivarun91
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorJames Krusic
 
Social Engineering: the Bad, Better, and Best Incident Response Plans
Social Engineering: the Bad, Better, and Best Incident Response PlansSocial Engineering: the Bad, Better, and Best Incident Response Plans
Social Engineering: the Bad, Better, and Best Incident Response PlansRob Ragan
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationJamie Proctor-Brassard
 
Social engineering
Social engineeringSocial engineering
Social engineeringVishal Kumar
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notesLinda Barron
 
Social Engineering and What to do About it
Social Engineering and What to do About itSocial Engineering and What to do About it
Social Engineering and What to do About itAleksandr Yampolskiy
 
Social Engineering Techniques
Social Engineering TechniquesSocial Engineering Techniques
Social Engineering TechniquesNeelu Tripathy
 
Social Engineering
Social EngineeringSocial Engineering
Social EngineeringAhmed Musaad
 
Cyber security certification course
Cyber security certification courseCyber security certification course
Cyber security certification courseNishaPaunikar1
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacksRamiro Cid
 

What's hot (19)

Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Social engineering tales
Social engineering tales Social engineering tales
Social engineering tales
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Prevent phishing scams
Prevent phishing scamsPrevent phishing scams
Prevent phishing scams
 
Social engineering
Social engineering Social engineering
Social engineering
 
Cyber security.docx
Cyber security.docxCyber security.docx
Cyber security.docx
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
 
Social Engineering: the Bad, Better, and Best Incident Response Plans
Social Engineering: the Bad, Better, and Best Incident Response PlansSocial Engineering: the Bad, Better, and Best Incident Response Plans
Social Engineering: the Bad, Better, and Best Incident Response Plans
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notes
 
Social Engineering and What to do About it
Social Engineering and What to do About itSocial Engineering and What to do About it
Social Engineering and What to do About it
 
Social Engineering Techniques
Social Engineering TechniquesSocial Engineering Techniques
Social Engineering Techniques
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Cyber security certification course
Cyber security certification courseCyber security certification course
Cyber security certification course
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 

Similar to The Emotional Lure of Social Engineering

Security awareness-checklist 2019
Security awareness-checklist 2019Security awareness-checklist 2019
Security awareness-checklist 2019Mustafa Kuğu
 
Prevent phishing scams
Prevent phishing scamsPrevent phishing scams
Prevent phishing scamsronpoul
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness trainingAbdalrhmanTHassan
 
Article1DISCUSSION_1Information security within an organi
Article1DISCUSSION_1Information security within an organiArticle1DISCUSSION_1Information security within an organi
Article1DISCUSSION_1Information security within an organimallisonshavon
 
Learn About Social Engineering Services - Aardwolf Security
Learn About Social Engineering Services - Aardwolf SecurityLearn About Social Engineering Services - Aardwolf Security
Learn About Social Engineering Services - Aardwolf SecurityAardwolf Security
 
Insiders Guide to Social Engineering - End-Users are the Weakest Link
Insiders Guide to Social Engineering - End-Users are the Weakest LinkInsiders Guide to Social Engineering - End-Users are the Weakest Link
Insiders Guide to Social Engineering - End-Users are the Weakest LinkRichard Common
 
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...IRJET Journal
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptBushra22
 
Email threat detection and mitigation
Email threat detection and mitigationEmail threat detection and mitigation
Email threat detection and mitigationNimishaRawat
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdfPavelVtek3
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteRapidSSLOnline.com
 
Security and the Service Desk
Security and the Service DeskSecurity and the Service Desk
Security and the Service DeskNorthCoastHDI
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security riskK. A. M Lutfullah
 
Most Important Data Security Concerns Troubling Enterprises
Most Important Data Security Concerns Troubling EnterprisesMost Important Data Security Concerns Troubling Enterprises
Most Important Data Security Concerns Troubling EnterprisesBryTech INC
 
Network Security and Spoofing Attacks
Network Security and Spoofing AttacksNetwork Security and Spoofing Attacks
Network Security and Spoofing AttacksPECB
 
Computer hacking
Computer hackingComputer hacking
Computer hackingArjun Tomar
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptxRajviNikeetaRathore
 
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityPixel Crayons
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingmentAswani34
 

Similar to The Emotional Lure of Social Engineering (20)

Security awareness-checklist 2019
Security awareness-checklist 2019Security awareness-checklist 2019
Security awareness-checklist 2019
 
Prevent phishing scams
Prevent phishing scamsPrevent phishing scams
Prevent phishing scams
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
 
Article1DISCUSSION_1Information security within an organi
Article1DISCUSSION_1Information security within an organiArticle1DISCUSSION_1Information security within an organi
Article1DISCUSSION_1Information security within an organi
 
Learn About Social Engineering Services - Aardwolf Security
Learn About Social Engineering Services - Aardwolf SecurityLearn About Social Engineering Services - Aardwolf Security
Learn About Social Engineering Services - Aardwolf Security
 
Insiders Guide to Social Engineering - End-Users are the Weakest Link
Insiders Guide to Social Engineering - End-Users are the Weakest LinkInsiders Guide to Social Engineering - End-Users are the Weakest Link
Insiders Guide to Social Engineering - End-Users are the Weakest Link
 
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Attacks
Cyber AttacksCyber Attacks
Cyber Attacks
 
Email threat detection and mitigation
Email threat detection and mitigationEmail threat detection and mitigation
Email threat detection and mitigation
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
 
Security and the Service Desk
Security and the Service DeskSecurity and the Service Desk
Security and the Service Desk
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
Most Important Data Security Concerns Troubling Enterprises
Most Important Data Security Concerns Troubling EnterprisesMost Important Data Security Concerns Troubling Enterprises
Most Important Data Security Concerns Troubling Enterprises
 
Network Security and Spoofing Attacks
Network Security and Spoofing AttacksNetwork Security and Spoofing Attacks
Network Security and Spoofing Attacks
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptx
 
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on Cybersecurity
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 

More from The TNS Group

Your Phone System Remains Important for Business—Here’s Why.pdf
Your Phone System Remains Important for Business—Here’s Why.pdfYour Phone System Remains Important for Business—Here’s Why.pdf
Your Phone System Remains Important for Business—Here’s Why.pdfThe TNS Group
 
How to Interview Your Prospective IT Provider.pdf
How to Interview Your Prospective IT Provider.pdfHow to Interview Your Prospective IT Provider.pdf
How to Interview Your Prospective IT Provider.pdfThe TNS Group
 
6 Indicators That Your Current IT Solution Needs an Overhaul
6 Indicators That Your Current IT Solution Needs an Overhaul6 Indicators That Your Current IT Solution Needs an Overhaul
6 Indicators That Your Current IT Solution Needs an OverhaulThe TNS Group
 
Holiday Cybersecurity Tips
Holiday Cybersecurity TipsHoliday Cybersecurity Tips
Holiday Cybersecurity TipsThe TNS Group
 
Top 10 Cybersecurity Tips of 2022
Top 10 Cybersecurity Tips of 2022Top 10 Cybersecurity Tips of 2022
Top 10 Cybersecurity Tips of 2022The TNS Group
 
Benefits of an MSP: Increased Profitability
Benefits of an MSP: Increased ProfitabilityBenefits of an MSP: Increased Profitability
Benefits of an MSP: Increased ProfitabilityThe TNS Group
 
Cybersecurity and the Shipping Industry
Cybersecurity and the Shipping IndustryCybersecurity and the Shipping Industry
Cybersecurity and the Shipping IndustryThe TNS Group
 
Top Tech Trends of 2020
Top Tech Trends of 2020Top Tech Trends of 2020
Top Tech Trends of 2020The TNS Group
 
How Office 365 can Save Thanksgiving
How Office 365 can Save ThanksgivingHow Office 365 can Save Thanksgiving
How Office 365 can Save ThanksgivingThe TNS Group
 
Construction: Protect Your Assets From Ground-Breaking Threats
Construction: Protect Your Assets From Ground-Breaking ThreatsConstruction: Protect Your Assets From Ground-Breaking Threats
Construction: Protect Your Assets From Ground-Breaking ThreatsThe TNS Group
 
Distribution Industry: What is Ransomware and How Does it Work?
Distribution Industry: What is Ransomware and How Does it Work?Distribution Industry: What is Ransomware and How Does it Work?
Distribution Industry: What is Ransomware and How Does it Work?The TNS Group
 
Distribution Industry: Hardware Infrastructure Upgrades
Distribution Industry: Hardware Infrastructure UpgradesDistribution Industry: Hardware Infrastructure Upgrades
Distribution Industry: Hardware Infrastructure UpgradesThe TNS Group
 
Healthcare Industry: Updates and Upgrades
Healthcare Industry: Updates and UpgradesHealthcare Industry: Updates and Upgrades
Healthcare Industry: Updates and UpgradesThe TNS Group
 
Data Security: Are you Protected?
Data Security: Are you Protected?Data Security: Are you Protected?
Data Security: Are you Protected?The TNS Group
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity PlanningThe TNS Group
 
Infrastructure and Desktop Support
Infrastructure and Desktop SupportInfrastructure and Desktop Support
Infrastructure and Desktop SupportThe TNS Group
 
Cloud Managed Services: Cloud Infrastructure
Cloud Managed Services: Cloud InfrastructureCloud Managed Services: Cloud Infrastructure
Cloud Managed Services: Cloud InfrastructureThe TNS Group
 
Maritime Shipping: Industries we Serve
Maritime Shipping: Industries we ServeMaritime Shipping: Industries we Serve
Maritime Shipping: Industries we ServeThe TNS Group
 

More from The TNS Group (20)

Your Phone System Remains Important for Business—Here’s Why.pdf
Your Phone System Remains Important for Business—Here’s Why.pdfYour Phone System Remains Important for Business—Here’s Why.pdf
Your Phone System Remains Important for Business—Here’s Why.pdf
 
How to Interview Your Prospective IT Provider.pdf
How to Interview Your Prospective IT Provider.pdfHow to Interview Your Prospective IT Provider.pdf
How to Interview Your Prospective IT Provider.pdf
 
6 Indicators That Your Current IT Solution Needs an Overhaul
6 Indicators That Your Current IT Solution Needs an Overhaul6 Indicators That Your Current IT Solution Needs an Overhaul
6 Indicators That Your Current IT Solution Needs an Overhaul
 
Holiday Cybersecurity Tips
Holiday Cybersecurity TipsHoliday Cybersecurity Tips
Holiday Cybersecurity Tips
 
Top 10 Cybersecurity Tips of 2022
Top 10 Cybersecurity Tips of 2022Top 10 Cybersecurity Tips of 2022
Top 10 Cybersecurity Tips of 2022
 
Benefits of an MSP: Increased Profitability
Benefits of an MSP: Increased ProfitabilityBenefits of an MSP: Increased Profitability
Benefits of an MSP: Increased Profitability
 
Cybersecurity and the Shipping Industry
Cybersecurity and the Shipping IndustryCybersecurity and the Shipping Industry
Cybersecurity and the Shipping Industry
 
Top Tech Trends of 2020
Top Tech Trends of 2020Top Tech Trends of 2020
Top Tech Trends of 2020
 
How Office 365 can Save Thanksgiving
How Office 365 can Save ThanksgivingHow Office 365 can Save Thanksgiving
How Office 365 can Save Thanksgiving
 
Construction: Protect Your Assets From Ground-Breaking Threats
Construction: Protect Your Assets From Ground-Breaking ThreatsConstruction: Protect Your Assets From Ground-Breaking Threats
Construction: Protect Your Assets From Ground-Breaking Threats
 
Distribution Industry: What is Ransomware and How Does it Work?
Distribution Industry: What is Ransomware and How Does it Work?Distribution Industry: What is Ransomware and How Does it Work?
Distribution Industry: What is Ransomware and How Does it Work?
 
Distribution Industry: Hardware Infrastructure Upgrades
Distribution Industry: Hardware Infrastructure UpgradesDistribution Industry: Hardware Infrastructure Upgrades
Distribution Industry: Hardware Infrastructure Upgrades
 
Healthcare Industry: Updates and Upgrades
Healthcare Industry: Updates and UpgradesHealthcare Industry: Updates and Upgrades
Healthcare Industry: Updates and Upgrades
 
Data Security: Are you Protected?
Data Security: Are you Protected?Data Security: Are you Protected?
Data Security: Are you Protected?
 
IT Consultng
IT ConsultngIT Consultng
IT Consultng
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planning
 
Infrastructure and Desktop Support
Infrastructure and Desktop SupportInfrastructure and Desktop Support
Infrastructure and Desktop Support
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud Managed Services: Cloud Infrastructure
Cloud Managed Services: Cloud InfrastructureCloud Managed Services: Cloud Infrastructure
Cloud Managed Services: Cloud Infrastructure
 
Maritime Shipping: Industries we Serve
Maritime Shipping: Industries we ServeMaritime Shipping: Industries we Serve
Maritime Shipping: Industries we Serve
 

Recently uploaded

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 

Recently uploaded (20)

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 

The Emotional Lure of Social Engineering

  • 1. THE EMOTIONAL LURE OF SOCIAL ENGINEERING
  • 2. Social engineering can sound quite alluring to some. The word “social” tends to have a positive connotation as it relates to our personal and professional lives. Put the word engineering after it and it might remind you to call some of your IT friends and schedule a night out. Unfortunately, social engineering in the cyber world is vastly different.
  • 3. WHAT IS SOCIAL ENGINEERING? So, what is social engineering? It is the art of manipulating others to release confidential information. Cyber criminals are focusing on the trusting nature of others verses weaknesses in their technology infrastructure. Especially since their tactics can be so appealing that employees willingly provide passwords or information needed to access their company’s systems. This is all done without any knowledge that they have just been exploited. It is an art, and educating your employees is vital.
  • 4. WATCH OUT! It is important that employees are aware of the types of attacks that are out there. To take it a step further, they should look at all types of correspondence with a suspicious eye. Below are some common social engineering attacks, but be aware that hackers are always one step ahead of the game. One attack today may be surpassed by another tomorrow. The most common forms of social engineering include spear phishing, baiting, quid pro quo, and email attachments from a so-called friend.
  • 5. PHISHING SCHEMES If you are a committed reader of our blogs, you have come across phishing schemes more than a few times. Phishing is the leading form of social engineering attacks typically delivered in the form of email from a (seemingly) trustworthy source. Cyber criminals may claim that the end user is the “winner” of a grand prize or may ask for a charitable donation after a nationwide disaster or tragedy takes place (wiring instructions are fully intact). Regardless, these types of scams vary in their complexity and their attacker’s objectives, with spear phishing and whaling attacks being the more sophisticated forms of phishing.
  • 6. PHISHING SCHEMES Spear phishing is a tactical approach that uses an email that appears to come from a business or someone that you know; but in reality, is malicious and seeks to obtain sensitive information (bank account numbers, passwords, financial information, etc.) in a timely manner. Pretexting is similar to spear phishing but instead of focusing on “urgency” it relies on building a false sense of trust with the end user by impersonating a co-worker or employer to gain sensitive information. Additionally, whaling refers to going after a potentially large target – generally Executives or high- level accounting professionals who have the ability to authorize large transactions.
  • 7. PHISHING SCHEMES Spoofing uses e-mail sent from spoofed or similar-sounding domain names to make it appear as though these emails were sent from senior executives of a victim’s company. This tactic is often used in conjunction with spear phishing in order to add the appearance of legitimacy. To avoid these damaging attacks, click here to learn guidelines and general rules to follow to stay protected.
  • 8. BAITING Baiting is similar to phishing but it involves enticing the end user with something of interest in exchange for private data. Baiters may offer users free music or movie downloads, if they surrender their personal login credentials. What better way to pass time at work than with free music, right? Baiting can also come in physical forms, such as a corporate branded flash drive that is labeled with something directly related to your work or department. The most documented baiting attack occurred in 2006 and is still relevant today as the USB is still alive and kicking in the workplace. In this case, USBs were intentionally infected and disbursed in the employee parking lot of their financial employer. Have you ever heard the term, “curiosity killed the cat?”
  • 9. EMAIL ATTACHMENTS FROM A “FRIEND” If a hacker can break into your email, they can access your contents and send malicious email from someone that you know. Recently there have been some issues regarding potential malicious attachments in email. These malicious emails vary in subject and are usually titled to draw attention (IRS, invoices, billing, etc.). Anything that is asking you to perform additional actions / tasks should be considered more carefully. In today’s world, you should work under the guise that all attachments are hostile until proven otherwise.
  • 10. EMAIL ATTACHMENTS FROM A “FRIEND” One of the most common means by which a computer is compromised is through email attachments. When opened, these attachments can give hackers complete control of your machine and in turn, control over other machines in your environment, servers and networks.
  • 11. HERE ARE A FEW GUIDELINE S TO FOLLOW AS IT RELATES TO EMAIL ATTACHME NTS 1. Don’t open “surprise attachments” (something that you are not expecting). 2. If you don’t know the person sending the attachment, don’t open it. 3. Only open attachments with recognizable file extensions, i.e., excel, word (avoid .exe, .pif, .scr, .docm, .lotterywinner, etc.) 4. Don’t open attachments to emails that appear incomplete, incoherent, or simply “look wrong.” 5. Zip and PDF files should be looked at with scrutiny prior to opening as they are key players in transferring malicious content. 6. If you are unsure of the attachment, don’t open it. These threats are mitigated by your spam filter, however no spam solution is foolproof. Mail attachments should be treated with a degree of caution. Everyone is fair game no matter how big or small your company is.
  • 12. QUID PRO QUO I give you something and you give me something and we are even. Not so fast. If you are contacted at work and told that you will receive a gift card for $500 if an IT specialist can scan your network if you provide the credentials, it’s too good to be true. Please note that the most common type of Quid Pro Quo attacks are hackers that impersonate IT people. There are less sophisticated forms of attack that involved free chocolate and passwords. This attack may be dated back to 2004, but our love of chocolate remains in all of us, consider this a friendly reminder.
  • 13. “IF I EDUCATE MY EMPLOYEES I SHOULD BE GOOD RIGHT?” As noted, educating your employees of the latest attacks and what to look out for is extremely important. However, locking down your networks should not be taken lightly. It is important to make any form of hacking as difficult as possible.
  • 14. WORKING WITH A REPUTABLE MANAGED SERVICE PROVIDER (MSP) WILL ENSURE THE FOLLOWING: Software updates are installed on all computers when released Network security is managed through anti-virus software and other features that prevent unauthorized access Managed backup and disaster recovery (BDR) solution is in place Anti-spam filters are put in place to eliminate certain emails before they even get to your end users
  • 15. These services are extremely important to the health of your business. Proper network security minimizes downtime and revenue lost. To ensure that your network is properly secure, contact The TNS Group today and reduce your risks of a cyberattack.