<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=905697862838810&amp;ev=PageView&amp;noscript=1">
Fraud & Cyber Security | 2 min read

Gone Phishing: The Dangers of Social Engineering

Social engineering is more popular than ever. Why? Simple—it works, and it works well. From Odysseus' Trojan Horse to the modern business attack, the art of manipulating human decision-making is a timeless threat. Easy access to the Internet empowers malicious actors with the intelligence, tools, and anonymity they need to develop effective campaigns. Whether you are a small business or a Fortune 500 company, you and your employees will likely face this threat and must remain on guard to defend against it.

Malicious actors target businesses daily and try to illegally access their systems. One common tactic is phishing.

How Phishing Works

In a phishing scam, the attacker sends emails that looks like they are from a trusted source like your bank, insurance company, employer, cable provider, etc. The message tells you that some sort of action is required and then prompts you to click on a link or open an attachment. Many times, attackers will use messaging that invokes fear or panic. For example: "We've identified fraudulent activity on your account. Click here to review your recent transactions and report anything you believe is fraudulent." Attackers hope that your first reaction is to click on the link to resolve the issue as soon as possible. However, they may also use tactics that invoke excitement with messaging like "You've won free concert tickets. Click here to claim your prize!" to encourage you to act now.

If successful, the attacker may install malware on the recipient's computer or steal information. Once a computer is compromised, the attacker may expand their access to other computers. Attackers may also manipulate the recipient into doing something harmful like transferring funds. If unsuccessful, the attacker will adjust the attack until they reach their objective. In other words, the attacker will continue to "phish" until someone takes the bait.

To protect your company, you may use several methods to prevent successful phishing attacks:

  • Configure your email security gateway to block attempts that come from known threats.
  • Arm your employees by implementing mandatory security education training, so they know how to identify and react to social engineering attempts.
  • Allow your employees to report phishing attempts directly from their email software.
  • Use tools to send fake phishing messages to test and train your employees.

Social engineering will continue to target human decision making and prey upon the victim’s tendencies. Therefore, it is important to continue to identify new threats and ways to lower your risk of experiencing social engineering attacks. It is important to remember that while technical methods may help lower risk, educating individual employees remains the best defense. With faced with a threat from email or on the phone, you and your employees are the last and best line of defense. You and your employees must all remain suspicious of email messages, and not follow a hyperlink or open email attachments unless it is from a known, trusted the source. As always, think before you click!

Remember what to look for:

To identify a phishing attack, please look for one or more of the following indicators:

  • Unsolicited email messages requesting sensitive personal or company information • Requests from unknown or spoofed senders to click on hyperlinks or open attachments
  • Spoofed message from someone you know to act on their behalf or complete a task
  • Warnings or threats with offers of quick fixes by following a link or installing software
  • Offers, promotions, or notices that prompt you to claim rewards, winnings, or prizes
  • Messages with spelling or grammar errors with abnormal business or personal language

While not an exhaustive list, these indicators may help you identify an attack. To conclude, cybercrime happens every day, and it's up to you and your employees to protect your business and your customers. While the steps outlined above are not an exhaustive list of all the precautions you may take, we hope you will use this information as a starting point to help lessen the likelihood of a data breach.

Related Categories

Fraud & Cyber Security

Jeffrey Julig

Jeffrey Julig is Senior Vice President and Chief Information Security Officer (CISO) for SWBC. In this role, he leads a team of security professionals to protect SWBC’s diverse lines of business from internal and external cyber threats. Jeffrey is passionate about information security and privacy and belongs to numerous international, national, and local professional and community organizations. He has a Bachelor of Science degree in Cybersecurity from the University of Maryland University College and earned several of the information security industry’s most respected certifications, including the Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), and Law of Data Security and Investigations (GIAC-GLEG) certifications. Jeffrey attended the Department of Defense Cybercrime Investigations Training Academy (DCITA) and is a certified digital forensics examiner.

You may also like:

Fraud & Cyber Security

Cyber Liability Underwriters Require Companies to Do These 6 Things

If your organization isn’t practicing basic security hygiene, you may not have access to cyber liability insurance. Most...

Fraud & Cyber Security

Common Retail Insurance Claims and How to Avoid Them

Retail business owners often operate on tight margins, and challenges like shoplifting, employee theft, weather and fire...

Fraud & Cyber Security Insurance

Reimagining To-Go Revenue with Ghost Kitchens and Virtual Brands

Ghost kitchens and virtual brands represent an exciting new trend in the restaurant industry. By totally reimagining the...

Let Us Know What You Thought about this Post.

Put your Comment Below.

Blog-CTA-Icon_Webinar-Video

FREE WEBINAR

Navigating Mental Wellness: Strategies for Conquering Workplace Challenges

Join our webinar for strategies on mental wellness and prioritizing your and your employee's well-being. 
On Demand | Duration: 52 minutes

Watch Now