How Social Engineering Attacks Happen and How to Avoid Them
We’ve already discussed why social engineering should be your biggest security issue , but this figure shows how these attacks happen online, over the phone, and even in person, and what you should look out for.
The graphics, created by the folks at SmartFile, are a great description of the myriad of ways someone might try to squeeze information out of you. Not every social engineering attack involves obtaining passwords or bank account numbers – sometimes it is about learning some useful information that could help an attacker answer security questions, or someone will just slip through the door behind you in your office when you go to work in the office. morning.
As far as how to avoid these attacks, the main thing is to make sure that you are observing them, and not so much that you can defend against all of them. Simple things like ignoring suspicious links, phone calls, emails, etc. are a good start, but since most of the company’s data leaks come from internal sources, it’s good to be on the lookout for anyone who wants to exploit you – and gain access to you may be at work – like a girl. There are some more tips in the article below, besides how these attacks are actually carried out, with examples.
23 Social Engineering Attacks To Stop | SmartFile