Example case:
Juan is a manager at a company that has very strict IT security policies to prevent attacks by cybercriminals. As an important person within the organization, he is very aware of cyberattacks and his level of protection is high, so it is a difficult objective to achieve if we go after him directly.
In this case, all of Juan's friends, family and coworkers are monitored, both online and offline, to identify who is who. Once these tasks have been completed, the cybercriminal will begin his strategy to reach Juan and deceive him.
Thanks to the data obtained in this phase of investigation, we have obtained some email addresses, personal telephone numbers and physical addresses.
We studied all these people and after a lot of data, we know that Juan has a weakness for comic book characters, a fact that very few people know, we have obtained it thanks to social engineering. At this point, with this information, our success rate is high.
One day, Juan receives a supposed email message from “Comikx Figures”, a company that sells figures of comic book characters.
What Juan doesn't know is that turkey phone data someone is impersonating this company and their intentions are not good at all. After a few days and having trusted these emails, Juan receives an offer that he can't pass up: the Darkseid #1 figure from 1970, an essential fetish for this type of collector.
Having gained his trust, Juan clicks on the link in the body of the email. From that moment on, he is in the hands of the cybercriminal. Whatever happens next is no longer in Juan's hands and could be catastrophic for the company he works for and even for his personal life. You can imagine the consequences.
You may be surprised, but the best way to avoid attacks of this type is to use common sense.
In a world as fast-paced as today's, it's easy to open an email in a hurry, so in addition to configuring our manager well to avoid spam as much as we can, we should spend a few seconds before opening any email to try to make sure it's from a reliable source, so, yes, to protect ourselves, it's best to be distrustful.
Another measure that we can choose regardless of the operating system we use is an antivirus, this will help us identify malicious software among other things.
Raising awareness through training people inside and outside the workplace is one of the best ways to mitigate social engineering attacks. We recommend our Cybersecurity course where you can put into practice all the concepts we have talked about in this article.
How do we prevent social engineering attacks?
-
- Posts: 135
- Joined: Sat Dec 21, 2024 5:46 am