Medusa

How To Prepare For Social Engineering And Being Hacked

<p>As we all know&comma; theft is nothing new&period; But as our lives become increasingly digitized&comma; the tricks thieves use are continually changing&period; Unfortunately&comma; that means the tools criminals exploit evolve faster than our understanding of the technologies that make us vulnerable to conmen&period; Yet despite what Hollywood would have you believe&comma; hackers are rarely as sophisticated as we imagine them&period;<&sol;p>&NewLine;<p>While many hackers can &lpar;and do&rpar; bypass weak passwords&comma; take control of websites to steal personal information&comma; and construct viruses to infiltrate the personal information stored on our computers&semi; simple human naivety is far more often the path hackers use to commit their crimes&period; This common&comma; yet little discussed&comma; form of hacking called &OpenCurlyQuote;social engineering&period;’<&sol;p>&NewLine;<h2>What is Social Engineering&quest;<&sol;h2>&NewLine;<p style&equals;"text-align&colon; center"><img class&equals;"aligncenter" alt&equals;"" src&equals;"http&colon;&sol;&sol;farm3&period;staticflickr&period;com&sol;2755&sol;4306074797&lowbar;29cb7a4009&period;jpg" width&equals;"510" height&equals;"345" &sol;><&sol;p>&NewLine;<p>Social engineering is a digitally oriented con&comma; which exploits people rather than software&period; Instead of finding weaknesses in the digital infrastructures they wish to access&comma; hackers exploit the human element in the security systems that protect our personal and financial data&period; Whether impersonating repairmen&comma; IT professionals&comma; bank workers&comma; or the victims of their fraud&semi; social engineers manipulate people to obtain passwords and sensitive information&comma; which they then use to access financial data&period;<&sol;p>&NewLine;<h2>Common Hacks to Watch Out For<&sol;h2>&NewLine;<p>One common hack involves social engineers who impersonate customer service representatives from banks or credit card companies&period; They call you and tell you your account has been compromised and that you need to set a new password&period; Often&comma; these hackers will try to establish their legitimacy by providing some basic information that they’ve obtained either through accessing your email or sorting through your trash &lpar;such as your account number and the last 4 digits of your SSN&rpar;&period; You give them the password&comma; and they suddenly have access to your financial accounts&period;<&sol;p>&NewLine;<p>Another common con is perpetrated by hackers who pose&comma; in person&comma; as company representatives or consultants at your company&period; Using forged security badges&comma; tailgating their way into your company parking lot or office building&comma; and wielding clipboards&semi; they pretend to be tech support or consultants and ask for access to your computer or to confirm your account information&period;<&sol;p>&NewLine;<p>Phishing scams are also quite popular today amongst digital criminals&period; Sending out emails that purport to be from financial institutions&comma; they ask for login information and provide fake links to your account—saying&comma; for example&comma; that you have an important message or alert to read&period;<&sol;p>&NewLine;<p style&equals;"text-align&colon; center"><img class&equals;"aligncenter" alt&equals;"" src&equals;"http&colon;&sol;&sol;farm8&period;staticflickr&period;com&sol;7384&sol;9514093705&lowbar;0cae14a091&period;jpg" width&equals;"510" height&equals;"385" &sol;><&sol;p>&NewLine;<p>Often&comma; social engineers will pose as social media friends to learn information about you&comma; which they can then leverage to manipulate you into giving up your info&period;<&sol;p>&NewLine;<h2>8 Ways to Prevent Social Engineering<&sol;h2>&NewLine;<ul>&NewLine;<li> Shred Your Documents&excl; Don’t allow hackers the opportunity to obtain data about you through papers you failed to dispose of properly&period;<&sol;li>&NewLine;<&sol;ul>&NewLine;<ul>&NewLine;<li>Never enter passwords or personal info from links provided in emails&period; Legitimate financial institutions will never ask for them via email&period;<&sol;li>&NewLine;<&sol;ul>&NewLine;<ul>&NewLine;<li> If your bank or credit company calls saying your account has been compromised&comma; hang up and call them back with the number listed on the back of your card&period;<&sol;li>&NewLine;<&sol;ul>&NewLine;<ul>&NewLine;<li>Always ask for credentials and confirm with your superiors before giving out sensitive information to strangers at work—no matter how authoritative or official they seem&period;<&sol;li>&NewLine;<&sol;ul>&NewLine;<ul>&NewLine;<li>Use different logins and passwords for each service&period; That way&comma; if one account is compromised&comma; they won’t all be&period;<&sol;li>&NewLine;<&sol;ul>&NewLine;<ul>&NewLine;<li> Password protect your computer&comma; and don’t allow your internet browser to auto-fill the passwords for your financial websites&period;<&sol;li>&NewLine;<&sol;ul>&NewLine;<ul>&NewLine;<li> When shopping online&comma; use credit cards rather than debit cards&period; If the latter are compromised&comma; your entire bank account is at risk&period;<&sol;li>&NewLine;<&sol;ul>&NewLine;<ul>&NewLine;<li>Frequently check your accounts and monitor your personal data&period; This one is common sense&period; If something happens to your accounts&comma; the sooner you know&comma; the faster you can respond to minimize the damage&period;<&sol;li>&NewLine;<&sol;ul>&NewLine;<p>While it is impossible to protect yourself against every possible threat&comma; simply being aware of the dangers and taking some basic precautions against them will drastically reduce your odds of falling victim to social engineering&period; Even a small amount of vigilance will make you a harder target than most&comma; so that even if you do encounter a hacker&comma; they are more likely to move on to an easier victim if you can demonstrate suspicion and awareness&period;<&sol;p>&NewLine;<p>Ultimately&comma; understanding the potential threats and recognizing your own vulnerabilities are the two best ways to keep yourself secure in today’s digital landscape&period;<&sol;p>&NewLine;<h5>Featured images&colon;<&sol;h5>&NewLine;<p><span class&equals;"license">License&colon; Creative Commons<&sol;span><&sol;p>&NewLine;<p><span class&equals;"source">image source<&sol;span><&sol;p>&NewLine;<p><span class&equals;"license">License&colon; Creative Commons<&sol;span> <span class&equals;"source">image source<&sol;span><&sol;p>&NewLine;<p>Author&colon; Jenny is a graduate of engineering and would like to keep your knowledge up to date on all kinds of engineering and ones that can be harmful&period; Jen invested her time working in telegraph engineering careers in the field of scientific engineering and even worked in a lab&semi; if you want to work in engineering make sure you get involved in the right kind of engineering too&excl;<&sol;p>&NewLine;

Exit mobile version