JD Systems Blog

JD Systems has been serving the Valencia area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Would Your Users be Tricked by Social Engineering?

Would Your Users be Tricked by Social Engineering?

The term social engineering may not seem nearly as intimidating as other cybersecurity terms like ransomware or denial of service. Don’t be deceived! Some of the biggest threats to your company’s data and network security use social engineering to manipulate targets into taking a specific action - like disclosing personal information that can be stolen and exploited.

Often overlooked by the media in favor of major data breach events, there are few types of social engineering hacks that have the capability to devastate a business.

  1. Vishing: Given the fact that the number of people who fall for phishing attacks and other email scams has declined significantly, it was only a matter of time before hackers found an alternative avenue to exploit their targets. After abandoning it a few years ago in favor to digital scams, vishing - a fraudulent voice call that seeks personal information - have once again returned as a favorite among hackers and thieves.
  2. HTTPS: SSL certificates used to ensure that a website was legitimate and secure enough to protect your personal information. Websites that have ‘https’ no longer signifies security, as hackers have begun using websites that give away SSL certificates for free and using them to lull victims into a false sense of security. To make sure a website is secure, you’ll want to look for indication of an extended validation SSL (EV-SSL) which are not offered for free! EV-SSLs are signified with a green bar.
  3. Website Copy-Cats: Scammers have become very skilled at making spoof websites that look and feel just like the authentic website but are actually littered with all typesof malware. For example, after the Equifax data loss event in June 2017, Equifax set up a website to help their clients who had their information compromised with the URL: equifaxsecurity2017.com. A spoof of that website, with the domain securityequifax2017.com, was so convincing - it even tricked Equifax themselves! A few things to keep an eye out for when trying to determine if a website is legitimate, include:
    1. Make sure the URL is correct.
    2. Avoid giving out information unless a site has an EV-SSL.
    3. Look for seals of trust from other IT security websites.
    4. Beware of misspellings, typos and broken English.
  4. Every Word Password Theft: There are a lot of hacking tools that will scan through databases - including every word in the dictionary. These tools significantly increase the likelihood that a password that includes an actual word will be cracked and exploited. The best practices are ones that mix numbers, letters and symbols that make no sense.

When it comes to digital threats, for every exploit or hack that is prevented, a few, more advanced ones are developed. The best way to keep your business, and it’s data, safe is to take proactive measures and execute safe internet practices all times - and that goes for your employees, as well! Would you like to learn more about how you can stay ahead of hackers? Call us at JD Systems.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, 26 April 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Privacy Technology Cloud Hackers Google Microsoft Windows 10 Backup Business Hosted Solutions Business Computing Software Productivity Malware Browser Efficiency Internet Business Continuity Hardware Email Smartphones Mobile Devices Office Android Innovation User Tips Miscellaneous Data Upgrade Ransomware Computer Workplace Tips Disaster Recovery Chrome Small Business VoIP Alert Network Security Cybercrime Smartphone Social Media Microsoft Office Communication Employer-Employee Relationship Managed IT Services Server Holiday Telephone Systems Windows Save Money App Automation IT Services Business Management Productivity Computers Office Tips Passwords Facebook Network Health Virtualization Outsourced IT communications Hacking Collaboration Law Enforcement Operating System Application Marketing Money Bandwidth Remote Computing Quick Tips Spam Cybersecurity Mobility Managed Service Provider Bring Your Own Device Office 365 Managed IT Services Social Engineering Recovery Wi-Fi Router Lithium-ion battery Gmail Work/Life Balance Networking Password Saving Money Data Breach Website HaaS Mouse Private Cloud IT Support Flexibility Google Drive Safety Gadgets Mobile Device Management Big Data How To The Internet of Things Data Backup Spam Blocking Entertainment Two-factor Authentication Internet Exlporer Environment Cloud Computing Downtime Computer Care Word Data storage Samsung Automobile Phishing Mobile Computing WiFi Artificial Intelligence Hiring/Firing Data Storage Value End of Support Bluetooth Patch Management Settings Virtual Reality Wearable Technology USB Scam Best Practice Retail Humor Avoiding Downtime Physical Security Unsupported Software Redundancy Data Management Windows 10 Meetings Biometrics DDoS Apps Robot Remote Monitoring Worker IT solutions Public Cloud History Battery Cleaning Budget Risk Management Data Security Government Wireless Fax Server Excel Start Menu Shadow IT Troubleshooting Information Technology Analyitcs SaaS Internet of Things Multi-Factor Security Going Green Data loss SharePoint Video Games Charger Outlook Applications IT Consultant User PowerPoint Tools Windows 10s Scalability Trending Laptop Electronic Medical Records Screen Mirroring Apple Frequently Asked Questions Worker Commute Leadership Files Hacker Sports Books Vulnerability Instant Messaging Assessment Touchpad Save Time Cast eWaste Tip of the week Encryption Maintenance Managed IT VPN Emergency Solid State Drive Television Monitor User Error Windows Server 2008 Notifications webinar Science Botnet YouTube Audit Public Computer Social Reputation Human Resources Employer Employee Relationship IT Management Windows 7 Content Conferencing Shortcut Internet exploMicrosoft Windows 8 Travel NarrowBand Computer Fan People Techology Bloatware Search Customer Computer Accessories IT Plan Running Cable Flash Audiobook Emails Advertising Tablet Consultant Wireless Technology Transportation FENG Mobile Office Entrepreneur How to IBM Social Networking Politics Netflix Hard Drives Best Available Data Recovery Chromecast Benefits Supercomputer WIndows 7 Software Tips Sync Uninterrupted Power Supply Keyboard IT Support Tablets Memory Update Firewall OneNote Text Messaging BYOD Distributed Denial of Service Current Events Customer Relationship Management Relocation Rootkit Analytics Telephony Experience Hybrid Cloud Google Docs Smart Technology Root Cause Analysis Legal Education Knowledge Customer Service Managing Stress Training Users Skype Tech Support Music PDF Loyalty Programming Black Market Voice over Internet Protocol Two Factor Authentication Mobile Device HBO Streaming Media Computing Infrastructure Network Congestion Vendor Management

Blog Archive

Upcoming Events

No events