Does your team understand the dangers of social engineering?
Updated by Tom Bui [SSW] 1 year ago. See history
There are numerous examples of social engineering ranging from phone calls, attackers posing as friends on social media, all the way to sophisticated attempts at phishing users with near-perfect clones of popular websites.

Figure: ‘Do you think the average consumer could spot the phishing site?’ Source: Troy Hunt
The only solution to social engineering is to train properly and prepare users about the dangers presented by and common techniques used by malicious individuals.
For useful information on the topic reference the document ‘Avoiding Social Engineering and Phishing Attacks’ by the United States Computer Emergency Readiness Team or the Pluralsight course Ethical Hacking: Social Engineering by Troy Hunt.
With the above in mind, it is important to review regularly the information availed via search engines and standard operating procedures. Furthermore, it can be useful to test the readiness and alertness of staff by performing mock social engineering attacks.
Take the following situation as an example: the CEO is out of town and decides to use an employee’s laptop left in the office on the weekend, the employee in question is messaged via Teams for their domain password. If the employee is aware of the risks, this poses the company then they would not send the requested credentials and follow proper procedure around reporting a suspected incident.
Categories
Need help?
SSW Consulting has over 30 years of experience developing awesome software solutions.