TPM by United Systems – Social Engineering

,

We’ve all heard of cyber threats such as phishing and malware. While we all may be familiar with these terms and be educated on how to avoid or protect ourselves and our organizations from these types of attacks, these threats are only a small part of a much larger scheme called social engineering.

Over the last few weeks, the team at TPM by United Systems has been discussing social engineering, how cybercriminals use social engineering, and ways to protect yourself and your organization!

Breaking Down Social Engineering

Most people have heard terms like phishing and malware. But did you know those are only part of a larger scheme called social engineering? This cyberthreat is not a new kind of fraud. It has been used for many years to manipulate a wide range of people into giving up important data about themselves or their workplace. A prime example of social engineering goes back to Greek mythology with the Trojan horse. They infiltrated the city of Troy with a “peace offering” filled with soldiers, thus winning the war. With technology at the forefront of our lives, social engineering has entered a new era. Physical human interaction is not necessarily required anymore. These criminals gain information through emails, pop-ups, and public Wi-Fi networks, to name a few. The main objective is to influence, manipulate or trick users into giving up privileged information or access within an organization. They are doing this right under your nose, and if you’re not paying attention, you might be a victim as well.