PROACTIVE RISK
  • About
    • 800 lb Gorilla
    • Our Manifesto
    • Simple Agreements >
      • Mutual Confidentiality and Non Disclosure Agreement
      • Master Agreement | Work Order
    • BLOG
    • Capabilities Summary
    • Request Support
    • Contact Us
  • SOLUTIONS
    • Fractional CIO/CISO
    • Cyber Recruiter
    • Threat Modeling
    • Policies and Plans
    • MonitorIT®
    • Software Development
    • Domains | DNS
    • PhishIT®
    • MeasureRISK®
    • Vendor Risk
    • CATSCAN®
    • Physical Security
    • Backup Resiliency
    • ProtectIT®
    • ManageIT®
    • FINDIT® >
      • RAPTOR eDiscovery
  • RESOURCES
    • Tech News
    • Videos
    • Store
    • Guides | Tools
    • STAFF

GRAY BEARD BLOG

SHARING RANDOM THOUGHTS ON TECH

watch out for social engineering

2/15/2023

 
Social engineering is a tactic used by cybercriminals to trick individuals into divulging confidential information. Here are ten common ways social engineers gain access to confidential information:
  1. Phishing: Social engineers send an email or message that appears to be from a legitimate source, such as a bank or company, and requests sensitive information like passwords or account details.
  2. Baiting: Social engineers leave a tempting item, such as a USB drive or CD, in a public place in the hope that someone will pick it up and use it on their computer, which is infected with malware.
  3. Pretexting: Social engineers create a fake persona or pretext, such as posing as an IT support person or government official, to trick individuals into divulging information.
  4. Tailgating: Social engineers gain access to a secure area by following an authorized person, such as an employee or visitor, through a locked door.
  5. Piggybacking: Social engineers gain physical access to a secure area by requesting entry while impersonating an authorized person or pretending to have a legitimate reason for entry.
  6. Reverse social engineering: Social engineers make an individual feel important or valued in order to build trust and convince them to divulge confidential information.
  7. Spear phishing: Social engineers send highly targeted and personalized messages to a specific individual or group in order to gain access to confidential information.
  8. Phone phishing: Social engineers call individuals and pretend to be a legitimate source, such as a bank or company, in order to request confidential information.
  9. Dumpster diving: Social engineers search through an organization's trash to find sensitive information, such as financial statements or employee records.
  10. Human hacking: Social engineers use a combination of these tactics and other psychological tricks to manipulate individuals into divulging confidential information.
In order to protect against social engineering attacks, individuals and organizations should be vigilant, exercise caution, and follow best practices for data security and privacy.

For more information about our CATSCAN services contact us today

    Tom Brennan

    This is my blog, there are many like it but this one is mine. Enjoy.

    View my profile on LinkedIn

    BLOG Archives

    March 2023
    February 2023
    January 2023
    December 2022
    November 2022
    August 2022
    April 2022
    August 2021
    March 2021
    January 2021
    August 2020

    Categories

    All
    CMMC
    COMMUNITY
    TECHTIP

    RSS Feed

Contact Info

Proactive Risk Inc.
Tel: +1 (973) 298-1160
Web: www.proactiverisk.com
eMail: sales(at)proactiverisk.com

CONTACT US
Picture
© COPYRIGHT 2023. ALL RIGHTS RESERVED.
  • About
    • 800 lb Gorilla
    • Our Manifesto
    • Simple Agreements >
      • Mutual Confidentiality and Non Disclosure Agreement
      • Master Agreement | Work Order
    • BLOG
    • Capabilities Summary
    • Request Support
    • Contact Us
  • SOLUTIONS
    • Fractional CIO/CISO
    • Cyber Recruiter
    • Threat Modeling
    • Policies and Plans
    • MonitorIT®
    • Software Development
    • Domains | DNS
    • PhishIT®
    • MeasureRISK®
    • Vendor Risk
    • CATSCAN®
    • Physical Security
    • Backup Resiliency
    • ProtectIT®
    • ManageIT®
    • FINDIT® >
      • RAPTOR eDiscovery
  • RESOURCES
    • Tech News
    • Videos
    • Store
    • Guides | Tools
    • STAFF