logo
CyberVision
logo
  • Home
  • About
  • Solutions
    • WithSecure Corporate
    • F-Secure Consumer
  • Resources
    • Articles
    • Cybervision Humour
    • eBooks
    • Glossary of Terms
    • ID Theft Checker
    • Infographics
    • Local Threats
    • Useful links
    • Useful online security tips
    • Videos
    • Webinars
    • Whitepapers
  • Press
    • Newsletters
      • Cyber Security Bulletin
      • Cybervision Partner Newsletter
    • Local News
    • International News
  • Threats
  • POPIA
    • FAQ’s
    • Use RADAR to help comply
  • Contact
  • Blog
Business Security
22nd February 2019 by CyberVision 0 Comments 823 Views
22nd February 2019 by CyberVision in Business Security

5 Tips to stay on top of social engineering

Traditional hacking aims to compromise the settings of IT systems and applications. Social engineering refers to how attackers manipulate people into giving up confidential information. Social engineering attackers attempt to exploit the users of these technologies by claiming to be trusted acquaintances such as fellow employees, vendors or support personnel to try and trick the target. Being human, by omission, means that people in general are always trusting and willing to help others.  Attackers use this human trait to their advantage by deceiving victims into revealing information that compromises their data security. This technique has extended itself into the workplace, now compromising business data security, too.

 

Traditional protection from malware and viruses will not protect you from a social engineering attack. Once attackers gather bits and pieces of information about an organisation from the victim, they’ll be able to put the pieces of the puzzle together and exploit the entire business. Examples of social engineering include phishing emails, physical breaches, pretext calling, etc.

 

Be sure to train employees to follow safe security measures that one would implement in case of an attack. Here are five key tips to protect your employees from social engineering in the workplace:

 

  1. Always be cautious of sharing sensitive information about your organisation on social media platforms such as locations, new working partnerships, etc.
  2. Always be apprehensive of suspicious looking emails and questionable links.
  3. Never allow for a stranger to connect to your wireless network in the workplace.
  4. Review security policies regularly to stay up-to-date on the latest social engineering techniques.
  5. Never share personal information over the phone until you can verify where they are calling from.

 

Social engineering is still one of the most effective attack vectors. It is important to treat security awareness and training as an investment towards the safety of your organisation’s network and data.

0
Recommend
  • Facebook
  • Twitter
  • LinkedIN
  • Pinterest
Share
  • f-secure
  • f-secure cyber security
  • social engineering
Tagged in

Categories

  • Business
  • Business Security
  • F-Secure
  • F-Secure Life
  • Home Security
  • IoT & Technology
  • Online Marketing
  • Real life
  • Tech
  • Threats & Research

Recent Posts

  • F-Secure rises to 3rd Most Attractive Company for IT Students
  • F-Secure R&D discovers exploitable vulnerability in Apple’s macOS Gatekeeper
  • VMware vulnerability puts even more pressure on organizations relying on remote work
  • The cyber security risks of working from home
  • If your company data is breached, should you pay a ransom?

Archives

  • May 2021
  • April 2021
  • December 2020
  • April 2020
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • March 2015
  • February 2015

© CyberVision PTY Ltd | 2025 | All Rights Reserved.

View our Privacy Policy and Terms of Service.

logo