PROACTIVERISK
  • ๐Ÿ‘ฅ About
    • Mission | People
    • Capabilities Statement
    • Blog
    • 800 lb Gorilla
    • Press & Events
    • Videos
    • Careers
    • Books & Tools
    • Referral Program
    • Portals > >
      • Client Portal
      • Staff Portal
  • ๐Ÿ” Assess
    • Compliance Oversight
    • AI Investigate
    • RED/BLUE TEAM
    • Continuous Testing
    • 365 Assess
    • Industrial Controls
    • Digital Evidence
    • Threat Modeling
  • ๐Ÿง Train
    • KaliGPT
    • Instructor Led Training
    • Generative AI
    • Table Top Exercises
    • Talent Acquisition
    • Security Awareness as a Service
  • ๐Ÿ› ๏ธ Manage
    • Cybersecurity Leadership
    • IT Services
    • Integrated Security
    • 365 Protect
    • ContinuityXpert
    • Domains | DNS
    • InboxSafe
    • Supply Chain Risk Management
    • CYBER TRAFFIC FILTER
    • Custom Software?
  • ๐Ÿญ Industry
    • State and Local Gov.
    • Legal and Accounting Firms:
    • Financial Technology
    • Healthcare

GRAY BEARD BLOG

SHARING RANDOM THOUGHTS ON TECH

watch out for social engineering

2/15/2023

 
Social engineering is a tactic used by cybercriminals to trick individuals into divulging confidential information. Here are ten common ways social engineers gain access to confidential information:
  1. Phishing: Social engineers send an email or message that appears to be from a legitimate source, such as a bank or company, and requests sensitive information like passwords or account details.
  2. Baiting: Social engineers leave a tempting item, such as a USB drive or CD, in a public place in the hope that someone will pick it up and use it on their computer, which is infected with malware.
  3. Pretexting: Social engineers create a fake persona or pretext, such as posing as an IT support person or government official, to trick individuals into divulging information.
  4. Tailgating: Social engineers gain access to a secure area by following an authorized person, such as an employee or visitor, through a locked door.
  5. Piggybacking: Social engineers gain physical access to a secure area by requesting entry while impersonating an authorized person or pretending to have a legitimate reason for entry.
  6. Reverse social engineering: Social engineers make an individual feel important or valued in order to build trust and convince them to divulge confidential information.
  7. Spear phishing: Social engineers send highly targeted and personalized messages to a specific individual or group in order to gain access to confidential information.
  8. Phone phishing: Social engineers call individuals and pretend to be a legitimate source, such as a bank or company, in order to request confidential information.
  9. Dumpster diving: Social engineers search through an organization's trash to find sensitive information, such as financial statements or employee records.
  10. Human hacking: Social engineers use a combination of these tactics and other psychological tricks to manipulate individuals into divulging confidential information.
In order to protect against social engineering attacks, individuals and organizations should be vigilant, exercise caution, and follow best practices for data security and privacy.

For more information about our CATSCAN services contact us today

Comments are closed.

    Categories

    All
    CMMC
    COMMUNITY
    TECHTIP

    Tom Brennan

    This is my blog, there are many like it but this one is mine. Enjoy.

    View my profile on LinkedIn

    BLOG Archives

    June 2025
    May 2025
    February 2025
    January 2025
    November 2024
    August 2024
    June 2024
    May 2024
    April 2024
    February 2024
    January 2024
    December 2023
    November 2023
    September 2023
    August 2023
    March 2023
    February 2023
    January 2023
    December 2022
    November 2022
    August 2022
    April 2022
    August 2021
    March 2021
    January 2021
    August 2020

    RSS Feed

Contact Us
Proactive Risk
Adversaries Plan. We Preempt.
​​ 
290 W Mt. Pleasant Ave, Suite 11309
Livingston, NJ 07039

☎️ 973-298-1160 | GPS Map
Client Portal
ManageIT Remote

​© COPYRIGHT 2025. ALL RIGHTS RESERVED.
  • ๐Ÿ‘ฅ About
    • Mission | People
    • Capabilities Statement
    • Blog
    • 800 lb Gorilla
    • Press & Events
    • Videos
    • Careers
    • Books & Tools
    • Referral Program
    • Portals > >
      • Client Portal
      • Staff Portal
  • ๐Ÿ” Assess
    • Compliance Oversight
    • AI Investigate
    • RED/BLUE TEAM
    • Continuous Testing
    • 365 Assess
    • Industrial Controls
    • Digital Evidence
    • Threat Modeling
  • ๐Ÿง Train
    • KaliGPT
    • Instructor Led Training
    • Generative AI
    • Table Top Exercises
    • Talent Acquisition
    • Security Awareness as a Service
  • ๐Ÿ› ๏ธ Manage
    • Cybersecurity Leadership
    • IT Services
    • Integrated Security
    • 365 Protect
    • ContinuityXpert
    • Domains | DNS
    • InboxSafe
    • Supply Chain Risk Management
    • CYBER TRAFFIC FILTER
    • Custom Software?
  • ๐Ÿญ Industry
    • State and Local Gov.
    • Legal and Accounting Firms:
    • Financial Technology
    • Healthcare