One evening, during the graveyard shift, an AOL technical support operator took a call from a hacker. During the hour long conversation the hacker mentioned he had a car for sale. The technical support operator expressed an interest so the hacker sent him an e-mail with a photo of the car attached. When the operator opened the attachment it created a back door that opened a connection out of AOL's network, through the firewall, allowing the hacker full access to the entire internal network of AOL with very little effort on the hacker's part.
The above is a true story and it is an excellent example of one of the biggest threats to an organisation's security - social engineering. It has been described as people hacking and it generally means persuading someone inside a company to volunteer information or assistance.
Examples of techniques employed by hackers include:
Social engineering attacks can have devastating consequences for the businesses involved. Accounts can be lost, sensitive information can be compromised, competitive advantage can be wiped out and reputation can be destroyed.
By implementing some simple techniques you can reduce the risk of your organisation becoming a victim or, in the event that you are targeted, keep the consequences to a minimum.
Conduct regular audits, not only on IT systems but also on policies, procedures and personnel so that any potential weaknesses can be addressed as soon as possible.
About The Author
Rhona Aylward has extensive experience in the area of Quality Management and more recently in Information Security Management. She is a qualified Lead Auditor for BS7799 and CEO for Alpha Squared Solutions Ltd.
www.a2solutions.co.uk, raylward@a2solutions.co.uk
![]() |
|
![]() |
|
![]() |
|
![]() |
A little bit of time invested into learning about internet... Read More
File sharing on p2p is soaring despite the music and... Read More
When it comes to reporting Internet scams most of us... Read More
The first thing people think about when defending their computers... Read More
It has been said that with the wealth of information,... Read More
First, let's do a little recap'. As I stated in... Read More
The trash folder in my main inbox hit 4000 today.... Read More
Everyone should eliminate spyware and adware from your hard drive... Read More
History and BackgroundThe virus was one of the first ever... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
Computer infections can be broken up into 4 main categories... Read More
If you are wondering how to fight spyware for safe... Read More
The internet is undoubtedly a fantastic resource for families and... Read More
As more people are logging onto the Internet everyday, Network... Read More
When you signed up for that ultra-fast DSL or Cable... Read More
Spyware symptoms happen when your computer gets bogged down with... Read More
The most frustrating part of having Spyware on your computer... Read More
Identity Theft and Your Personal Information Identity theft is... Read More
If you are a parent, as am I, I think... Read More
Only the top spyware removers are successful at detecting and... Read More
Have you seen the web site, www.freestuff.com? Or have you... Read More
The Internet offers a global marketplace for consumers and businesses.... Read More
Someone recently told me, "You would have to be a... Read More
There is nothing more important that password security in world... Read More
Ok, ok, I know you've seen them. All those pop... Read More
These six ways to prevent identity theft offer you valuable... Read More
Watching how the traditional media covers the latest virus or... Read More
Much has been said on the theory of password protection... Read More
Whether we like it or not, we are all living... Read More
Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More
A couple of years back, I paid my dues the... Read More
First I would like to stress I am condoning the... Read More
High-tech private investigators are becoming the answer for many Internet... Read More
First the basic definition of Spyware: It is a type... Read More
What is computer security? Computer security is the process of... Read More
The top five online scams on the Internet hit nearly... Read More
There are several basic concepts to keep in mind when... Read More
Working from home has its advantages, including no commute, a... Read More
When surfing the Internet you probably take your anonymity for... Read More
There is nothing more important that password security in world... Read More
Over the past few years as the internet has become... Read More
Only the top spyware removers are successful at detecting and... Read More
It's been with us since 1993, it's gotten more intrusive,... Read More
Scams involving email continue to plague consumers across America, indeed... Read More
In the past I've never really paid much attention to... Read More
Identity Theft and Your Personal Information Identity theft is... Read More
No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More
You'd better learn news from media, not from emails, security... Read More
The Internet is a vast International Network of people and... Read More
This really chapped my lips...I recently bought a new computer.... Read More
It's late. You've been scouring the web for that perfect... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More
Have you ever had to call Symantec or McAfee to... Read More
First I would like to stress I am condoning the... Read More
There has not been a time in the history of... Read More
You may not realize it, but as you are surfing... Read More
So called phishers try to catch the information about the... Read More
A couple of years back, I paid my dues the... Read More
Long gone are the days that we could feel secure... Read More
Spyware is software that runs on a personal computer without... Read More
If you have used a Windows machine for a while,... Read More
File sharing on p2p is soaring despite the music and... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
The 1998 Data Protection Act was not an extension to,... Read More
Everyone should eliminate spyware and adware from your hard drive... Read More
Internet Security |