{"id":29155,"date":"2019-05-25T20:33:10","date_gmt":"2019-05-25T16:33:10","guid":{"rendered":"https:\/\/www.msp360.com\/resources\/?p=29155"},"modified":"2021-12-28T21:26:47","modified_gmt":"2021-12-28T17:26:47","slug":"social-engineering-prevention","status":"publish","type":"post","link":"https:\/\/www.msp360.com\/resources\/blog\/social-engineering-prevention\/","title":{"rendered":"Social Engineering Prevention"},"content":{"rendered":"<p>When you think of a modern-day hacker, chances are you picture a shady character camped out behind a sea of monitors, working all day and night to infiltrate networks and systems through fancy coding and password cracking.<\/p>\n<p><!--more-->In reality, a lot of the cyber attacks and data breaches that have surfaced in the news recently are actually brought about in a much simpler manner. The critical weaknesses are the gullible humans who sit behind computers around the world; hackers have found creative ways to use that gullibility to their advantage.<\/p>\n<p>This article explores the risk of social engineering attacks as well as methods for protecting against them. With online privacy such a precious commodity, it's more important than ever to be on the lookout for this kind of hack.<\/p>\n<p>For more information about phishing please refer to our guide on the topic:<\/p>\n<p><span class=\"further-reading \">Further reading<\/span>\u00a0<a href=\"https:\/\/www.msp360.com\/resources\/blog\/anti-phishing\/\">Anti-Phishing Guide<\/a><\/p>\n<h3>Social Engineering Meaning<\/h3>\n<p>Social engineering is a catch-all term in the cybersecurity industry and one that has taken on new meaning in the internet age. In fact, some of the earliest forms of this type of cyber attack date back to the beginning of the world wide web. Back then, it was easy to trick new internet users into divulging confidential information. Though technology has evolved a lot in recent decades, the same threat remains.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-29160 size-full\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/02\/internet-email.png\" alt=\"Social Engineering Meaning\" width=\"827\" height=\"662\" srcset=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/02\/internet-email.png 827w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/02\/internet-email-300x240.png 300w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/02\/internet-email-768x615.png 768w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/02\/internet-email-624x500.png 624w\" sizes=\"auto, (max-width: 827px) 100vw, 827px\" \/><\/p>\n<p>The goal of most hackers is simply to make money, although some have additional goals like damaging a company or organization's reputation or ability to carry out operations. In either case, the valuable asset they need is data.<\/p>\n<p>Social engineering is a shortcut to help hackers acquire confidential data faster. They make personal contact with an individual, usually one who works at the organization they are trying to infiltrate. Then they'll use one of a number of schemes to gain unauthorized access into one more systems where a larger attack or virus can be initiated.<\/p>\n<p>If you would like to find out more about other phishing types and techniques, please refer to our corresponding guide:<\/p>\n<p><span class=\"further-reading \">Further reading<\/span>\u00a0<a href=\"https:\/\/www.msp360.com\/resources\/blog\/types-of-phishing\/\">Methods and Types of Phishing Attacks<\/a><\/p>\n<div class=\"call-to-action\">\n<div class=\"call-to-action__left\">\n<div class=\"call-to-action__tag\">FREE DOWNLOADABLE ASSETS<\/div>\n<div class=\"call-to-action__title\">MSP\u2019s Assets to Stay Safe from Phishing<\/div>\n<div class=\"call-to-action__text\">Check out our assets that will help you to minimize the risk of a phishing attack, reduce the possible damage and increase the\u00a0security awareness.<\/div>\n<!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-a13a0279-a667-42d1-8ecd-608964d3c162\" data-portal=\"5442029\" data-id=\"a13a0279-a667-42d1-8ecd-608964d3c162\"><span class=\"hs-cta-node hs-cta-a13a0279-a667-42d1-8ecd-608964d3c162\" id=\"hs-cta-a13a0279-a667-42d1-8ecd-608964d3c162\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/a13a0279-a667-42d1-8ecd-608964d3c162\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-a13a0279-a667-42d1-8ecd-608964d3c162\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/a13a0279-a667-42d1-8ecd-608964d3c162.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code -->\n<\/div>\n<div class=\"call-to-action__right\"><img decoding=\"async\" style=\"max-width: 300px;\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/06\/Phishing_CTA-1.png\" alt=\"WP icon\" \/><span style=\"font-size: 1rem;\">\u00a0<\/span><span style=\"font-size: 1rem;\">\u00a0<\/span><\/div>\n<\/div>\n<h2>Social Engineering Methods<\/h2>\n<h3><a name=\"schemes\"><\/a>Overt Schemes<\/h3>\n<p>Email is by far the leader when it comes to instances of digital fraud. Many hackers choose to go the direct route and execute overt schemes on large groups of individuals. Even though a low percentage of these attacks are successful, the small number that takes the bait can result in a serious amount of damage.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-29161 size-full\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/02\/cycle.png\" alt=\"Overt Schemes\" width=\"789\" height=\"461\" srcset=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/02\/cycle.png 789w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/02\/cycle-300x175.png 300w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/02\/cycle-768x449.png 768w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/02\/cycle-624x365.png 624w\" sizes=\"auto, (max-width: 789px) 100vw, 789px\" \/><\/p>\n<p>In a best-case scenario, your company or email provider has a <a href=\"https:\/\/www.ltnow.com\/email-spam-filters-work\/\">strong filtering system<\/a> that is capable of detecting fraud messages and moving them to a junk mailbox or blocking them entirely. But even the best filters are bound to miss some malicious content, which means you can never let down your guard.<\/p>\n<p>Typically, an overt social engineering scheme will aim to tell a personal story via email that includes a request for action at the very end. For example, you may have received a spam message that claims to be from a friend or family member saying that they were mugged in a foreign city and need cash sent to them. This scheme is known as <a href=\"https:\/\/kevtownsend.wordpress.com\/2010\/08\/01\/the-art-of-social-engineering\/\">Londoning<\/a>.<\/p>\n<p>Other fraud emails will try to pose as legitimate business operations. They may try to sell you counterfeit goods or convince you to <a href=\"https:\/\/www.scamwatch.gov.au\/types-of-scams\/unexpected-money\/nigerian-scams\">buy into an advance fee<\/a> scam where they guarantee you will receive a certain amount of money. These types of attacks may seem ineffective, but even experienced internet users fall victim to them on a regular basis.<\/p>\n<p>Don\u2019t believe us? Dr. Phil deals with <a href=\"https:\/\/www.drphil.com\/shows\/a-catfish-meets-her-victim\/\">catfishing schemes<\/a> at least once a week.<\/p>\n<h3>Covert Schemes<\/h3>\n<p>When overt schemes fail, cybercriminals look towards more covert methods for gaining access to data and money. While much social engineering is done through email, low- tech attacks carried out over the phone or face-to-face can yield big results.<\/p>\n<p>In a covert social engineering attack, the hacker selects a specific individual as the target and then works to gain their trust. They may perform research online and look up the target on social media networks to understand where they work and live. They will usually target corporate users that have high-level administrative access to important back-end servers or databases.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-29156\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/02\/inforgaph-591x1024.png\" alt=\"\" width=\"591\" height=\"1024\" srcset=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/02\/inforgaph-591x1024.png 591w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/02\/inforgaph-173x300.png 173w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/02\/inforgaph-624x1082.png 624w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/02\/inforgaph.png 736w\" sizes=\"auto, (max-width: 591px) 100vw, 591px\" \/><\/p>\n<p>Once they have enough information, the hacker makes direct contact by phone posing as a customer or vendor who calls to resolve a \u201cproblem\u201d with an account. One common ploy is for the hacker to encourage the target to download a certain piece of software so they can share screens and solve the problem together.<\/p>\n<p>Learn how to implement a customer verification system:<\/p>\n<p><span class=\"further-reading \">Further reading<\/span> <a href=\"https:\/\/www.msp360.com\/resources\/blog\/customer-verification-for-msps\/\">Customer Verification for MSPs<\/a><\/p>\n<p>Of course, the <a href=\"https:\/\/www.avast.com\/c-malware\">software download is malware<\/a> and, just like that, a network is compromised.<\/p>\n<p>Even sneakier is a current scheme making the rounds where the attacker sends a text, claiming to be from the target\u2019s bank. The claim is made that a fraudulent transaction is suspected and the customer should just respond with a Y or yes in order that the problem could be investigated.<\/p>\n<p>That mere one letter confirmation response is all that is needed to get the hacker into the account and create some actually fraudulent transactions.<\/p>\n<p>When attacks are conducted via email it is called phishing. Usually, the message urges the reader to click on a link or respond with password credentials. Different method but the result is the same - a compromised network or account.<\/p>\n<p>A successful social engineering attack often leads to a larger data breach or widespread hack. <a href=\"https:\/\/www.msp360.com\/resources\/blog\/protect-backups-from-ransomware\/\">Ransomware<\/a> is a common type of malware that hackers use to remotely encrypt data on a compromised computer. The owner of the machine will be prompted to pay a ransom in order to gain access to their data again.<\/p>\n<h3>Defending Against Social Engineering<\/h3>\n<p id=\"last\">IT security has evolved over the years, leading to a number of smart tools that can detect problems or breaches and alert the right people. Unfortunately, those types of solutions don\u2019t protect against most forms of social engineering.<\/p>\n<div id=\"slidebox\"><a class=\"close\">\u00a0<\/a><!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-015aca63-e776-436f-9ef1-337ab4cf6692\" data-portal=\"5442029\" data-id=\"015aca63-e776-436f-9ef1-337ab4cf6692\"><span class=\"hs-cta-node hs-cta-015aca63-e776-436f-9ef1-337ab4cf6692\" id=\"hs-cta-015aca63-e776-436f-9ef1-337ab4cf6692\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/015aca63-e776-436f-9ef1-337ab4cf6692\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-015aca63-e776-436f-9ef1-337ab4cf6692\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/015aca63-e776-436f-9ef1-337ab4cf6692.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code --><\/div>\n<p>The onus for preventing these fall squarely on the individual or organization to provide <a href=\"https:\/\/digitalguardian.com\/blog\/social-engineering-attacks-common-techniques-how-prevent-attack\">preventative education and training<\/a>.<\/p>\n<p>Security should be emphasized as a priority across the entire organization. This can be a real challenge for large companies who have employees distributed across the globe with differing levels of access. For this reason, it's critical to protect your devices with a virtual private network (VPN) client.<\/p>\n<p>A VPN serves as a good first line of defense in the <a href=\"https:\/\/privacycanada.net\/online-privacy-guide\/\">war to protect our privacy online<\/a>. It functions by creating a secure (encrypted) tunnel between your local machine and the open internet. It can serve as a safeguard against social engineering attacks because even if a hacker is able to infiltrate your local network, they will be unable to decode any of the content in the data they intercept.<\/p>\n<p>For more information about phishing prevention, please read our guide:<\/p>\n<p><span class=\"further-reading \">Further reading<\/span>\u00a0<a href=\"https:\/\/www.msp360.com\/resources\/blog\/how-to-prevent-phishing\/\">Guide on How to Prevent Phishing<\/a><\/p>\n<h3>Final Thoughts<\/h3>\n<p>In a best-case scenario, social engineering is blocked at the initial point of attack, most successfully when the people in an organization are trained on how to identify attempts to target them.<\/p>\n<p>Keep in mind that online security training is not a one-time thing. It should be repeated and reinforced on a yearly or quarterly schedule if possible and certainly made a major part of any new hire\u2019s onboarding process.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When you think of a modern-day hacker, chances are you picture a shady character camped out behind a sea of monitors, working all day and night to infiltrate networks and systems through fancy coding and password cracking.<\/p>\n","protected":false},"author":66,"featured_media":29170,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[877,884],"tags":[],"class_list":["post-29155","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-articles","category-msp-business-articles"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/29155","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/users\/66"}],"replies":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/comments?post=29155"}],"version-history":[{"count":3,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/29155\/revisions"}],"predecessor-version":[{"id":52662,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/29155\/revisions\/52662"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media\/29170"}],"wp:attachment":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media?parent=29155"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/categories?post=29155"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/tags?post=29155"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}