Today’s employees are connected to the Internet all day every day, communicating with colleagues and stakeholders, sharing critical information and jumping from site to site. Less than 20 percent of respondents from a recent survey Mimecast conducted, said they felt completely confident in their ability to spot and defend against these cyberattacks. In 2017, these incidents have become even more common. For today’s companies, falling victim to one of these attacks is no longer a question of “if” but “when.”

Five types of social engineering scams to know:

  1. Phishing
    Phishing: is the leading tactic leveraged by today’s ransomware hackers, typically delivered in the form of an email, chat, web ad or website designed to impersonate a real system and organisation. Often crafted to deliver a sense of urgency and importance, the message within these emails often appears to be from the government or a major corporation and can include logos and branding.
  2. Baiting
    Baiting: similar to phishing, baiting involves offering something enticing to an end user in exchange for private data. The “bait” comes in many forms, both digital, such as a music or movie download, and physical, such as a branded ash drive labeled “Executive Salary Summary Q3 2016” that is left out on a desk for an end user to nd. Once the bait is taken, malicious software is delivered directly into the victim’s computer.
  3. Quid Pro Quo
    Similar to baiting, quid pro quo involves a request for the exchange of private data but for a service. For example, an employee might receive a phone call from the hacker posed as a technology expert offering free IT assistance in exchange for login credentials.
  4. Tailgating
    Tailgating is when an unauthorised person physically follows an employee into a restricted corporate area or system. The most common example of this is when a hacker calls out to an employee to hold a door open for them as they’ve forgotten their RFID card. Another example of tailgating is when a hacker asks an employee to “borrow” a private laptop for a few minutes, during which the criminal is able to quickly steal data or install malicious software.
  5. Pretexting
    Pretexting: is when a hacker creates a false sense of trust between themselves and the end user by impersonating a co-worker or a figure of authority within the company in order to gain access to private data. For example, a hacker may send an email or a chat message posing as the head of IT Support who needs private data in order to comply with a corporate audit (that isn’t real).

To learn more about the Datto Essential Cybersecurity Toolkit for SMB’s please contact Computer Merchants today.


Menu
Call: 1800 777 111