Social engineering is tricking people into giving up personal information such as passwords or bank details or allowing access to a computer in order to inadvertently install malicious software. Thieves and scammers use social engineering because it is easier to trick someone into revealing your password than it is to breach your security.

The term social engineering has its origin in the social sciences, where it refers to any effort of the factors of change with the purpose of influencing or shaping the behavior of the target population. In simpler terms, social engineering involves the use of manipulation in order to achieve an end, be it good or bad.

To carry out successful social engineering attacks, many hackers rely solely on the will to help their potential victims. Similarly, they may try to take advantage of their victims’ lack of technology knowledge. In most cases, hackers will conduct an investigation on the potential target. For individual purposes, this involves a thorough review of their social media accounts, looking for any information they can use to sell.

Another method would be business. Which hackers need someone undercover to collect data about the company they want to attack, its operations, the hierarchy of employees and the list of business partners. Most target low-level employees who have access to this information. Either you will trick your target into sharing this information voluntarily.

The best way to deal with the problem is to make people aware of it. Educating them about safety and encouraging the adoption of preventive measures and what you should teach both you and your employees would be:

▸If you suspect that someone is trying to perform a deception, you must demand that you identify yourself and try to reverse the situation by trying to obtain as much information from the suspect as possible.

▸Never share sensitive information with strangers or in public places such as social media, advertisements, etc.

▸Implement a set of security policies in the organization that minimize risk actions.

▸Carry out physical security controls to reduce the inherent danger to people.

Check also:
Man In The Middle – Be careful with these attacks
Phishing – simplest but dangerous way of Cyberattack


Deja un comentario

Tu dirección de correo electrónico no será publicada. Los campos obligatorios están marcados con *