Human Security Vulnerability - The Dangers of Social Enginnering

Everyone has received them at one time or another - phishing mails.
In many cases, such mails are already recognised by the spam filter and are sent to the spam folder. However, the tactics of cyber criminals are becoming more and more complex and it is becoming more and more difficult to recognise the latest methods.

With social engineering, hackers try to manipulate people into revealing confidential information. The criminals usually try to get you to give them your passwords or gain access to your computer, secretly install malicious software to get your passwords and control of your computer.

Of course, it’s a lot easier for cyber criminals to use social engineering tactics to get your password than it is to hack your software. Ask any security expert and they will tell you that the weakest link in the security chain is the human. It doesn’t matter how many locks and deadbolts are on your doors and windows, or whether you have guard dogs, alarms, floodlights, fences with barbed wire and armed security personnel; if you trust the person at the gate who claims to be the pizza delivery guy and you let them in without first checking to see if they are trustworthy, you are completely exposed to risk.

 

What does a social engineering attack look like?

If a cybercriminal manages to hack or manipulate someone’s email password, they will then have access to the hacked person’s entire contact list – and since most people use the same password everywhere, almost certainly the password for many other areas. Once this is the case, the criminal sends emails to all the person’s contacts or leaves messages on the social media pages of the person’s friends.

Email from another trusted source

Phishing attacks are also part of the social engineering strategy. This involves imitating a trusted source in order to obtain sensitive data.

Do not become a victim

Phishing attacks are widespread, short-lived and it only takes a few users to take the bait for a successful campaign – Still, there is a good way to protect yourself from them. Consider the following points to recognise a phishing attack:

Ultimately, you will never have absolute security against a hacker attack – but you can back up your data so that when the worst comes to the worst, you have it back in a matter of minutes. We are happy to advise you on the subject of backup & data security – our core business for over 20 years.

Further articles

Ransomware_veeam-green_LinkedIn_blog-aspect-ratio-500-680
What measures can I take to protect myself from a ransomware attack?
04 April 2023
Discover more
Black Friday_BLOG_Zeichenfläche 1
How do I recognise a phishing email?
09 March 2023
Discover more
mount10-mountains-1400x600