One evening, during the graveyard shift, an AOL technical support operator took a call from a hacker. During the hour long conversation the hacker mentioned he had a car for sale. The technical support operator expressed an interest so the hacker sent him an e-mail with a photo of the car attached. When the operator opened the attachment it created a back door that opened a connection out of AOL's network, through the firewall, allowing the hacker full access to the entire internal network of AOL with very little effort on the hacker's part.
The above is a true story and it is an excellent example of one of the biggest threats to an organisation's security - social engineering. It has been described as people hacking and it generally means persuading someone inside a company to volunteer information or assistance.
Examples of techniques employed by hackers include:
Social engineering attacks can have devastating consequences for the businesses involved. Accounts can be lost, sensitive information can be compromised, competitive advantage can be wiped out and reputation can be destroyed.
By implementing some simple techniques you can reduce the risk of your organisation becoming a victim or, in the event that you are targeted, keep the consequences to a minimum.
Conduct regular audits, not only on IT systems but also on policies, procedures and personnel so that any potential weaknesses can be addressed as soon as possible.
About The Author
Rhona Aylward has extensive experience in the area of Quality Management and more recently in Information Security Management. She is a qualified Lead Auditor for BS7799 and CEO for Alpha Squared Solutions Ltd.
www.a2solutions.co.uk, raylward@a2solutions.co.uk
Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More
Fishing on the Internet has come a long way. However,... Read More
Credit card fraud is a growing problem for online businesses... Read More
Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More
One evening, during the graveyard shift, an AOL technical support... Read More
From the "Ask Booster" column in the June 17, 2005... Read More
Millions of people make purchases online, but many people are... Read More
Pharming is one of the latest online scams and rapidly... Read More
It's late. You've been scouring the web for that perfect... Read More
The most frustrating part of having Spyware on your computer... Read More
It's a sad statistic, but hundreds of unsuspecting kids are... Read More
Over the past few years as the internet has become... Read More
The menacing campaigns that drive the corporate spyware and adware... Read More
This is the second in a series of articles highlighting... Read More
A couple of years back, I paid my dues the... Read More
First of all we need to get some terms stated.... Read More
This is not some new fangled techno-speak, it is a... Read More
If you know what is the 'Fishing' then it's very... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
Imagine my surprise when I received a phone call from... Read More
If you run any type of Internet business, Adware and... Read More
Spyware is software that runs on a personal computer without... Read More
Whether we like it or not, we are all living... Read More
According to the Anti-Phishing Working Group (APWG) email scams also... Read More
Yes, I'm wearing my encryption hat again. Why you may... Read More
If spyware were a person and he set himself up... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
You'd better learn news from media, not from emails, security... Read More
I am the victim of an internet scam. It is... Read More
No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More
As more people are logging onto the Internet everyday, Network... Read More
Spyware and adware are becoming major problems for online surfers... Read More
In 1997, I decided after 15 years as a practicing... Read More
Having a good Spyware eliminator on your computer is vital... Read More
These six ways to prevent identity theft offer you valuable... Read More
Phishing is a relatively new form of online fraud that... Read More
Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More
Do you know what "phishing" is?No, it doesn't mean you... Read More
In the past I've never really paid much attention to... Read More
Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More
Nowadays more and more people are using a computer. A... Read More
If you use emails actively in your communication, you must... Read More
The 1998 Data Protection Act was not an extension to,... Read More
Internet is the ocean of knowledge. In this ocean you... Read More
There you are busily typing away on your PC or... Read More
Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More
Fishing on the Internet has come a long way. However,... Read More
Before you enter your name, address or any other data... Read More
Millions of people make purchases online, but many people are... Read More
On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More
A few nights ago I received an email from "2CO"... Read More
According to the Anti-Phishing Working Group (APWG) email scams also... Read More
Huge number of spyware software applications are available in the... Read More
The top five online scams on the Internet hit nearly... Read More
When we think of adware, what comes to mind are... Read More
My first experience with a spyware BHO based infection was... Read More
We all get the odd virus now and then, but... Read More
"You've just won a fabulous vacation or prize package! Now,... Read More
Everyone should eliminate spyware and adware from your hard drive... Read More
One evening, during the graveyard shift, an AOL technical support... Read More
Today's Internet or World Wide Web is being over regulated.But,... Read More
Identity theft ? also known as ID theft, identity fraud... Read More
If spyware were a person and he set himself up... Read More
The Loss Prevention Manager should be receptive to the needs... Read More
Spies, spyware, internet parasites are among what they are usually... Read More
I Challenge You To Crack The Code ------------------------------------- I had... Read More
Internet Security |