Busines Solutions

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Tuesday, 3 April 2012

Protect your business by understanding common social engineering techniques

Posted on 15:13 by Unknown
Social engineering is the manipulation of the natural human tendency to trust. A social engineer’s main goal is gaining unauthorized access to systems or information in order to commit fraud. In most cases the social engineer never comes face to face with the victim. Social Engineering is steadily increasing as cyber criminals exploit people in tough economic times. Anyone can be a target for social engineers, including small businesses.



Educate yourself and your employees
As a small business, you may always update your anti-virus software, but what other actions do you take to keep your business secure? For example, have you educated your employees recently on what information is safe to divulge and to whom they can divulge it? Understanding social engineering techniques can help you develop a plan for how to protect your business from them.

Before you give any information away, think about the following:
  1. Why are you you being asked for this information? Is it usual to be asked for this sort of information in this format?
  2. Is the request coming from a known source?
  3. What consequences might come from misuse of the information you've been asked to provide or the action you have to take?
  4. Is there pressure to take action now?
Using this list can help you think carefully before providing a response and make you more confident in your decision before divulging sensitive information.

Recognize the signs
The list below describes some of the more common social engineering techniques:
  1. Impersonation: They may pose as a repairman, helpdesk tech or trusted third party.
  2. Name Dropping: They may use names of people from your company/family to make you believe they know you and gain your trust.
  3. Aggression: They also may try to intimidate you by threatening to escalate to a manager / executive if you do not provide the information/access they have requested.
  4. Conformity: They may tell you that everyone else has provided the information so it’s fine for you to provide the same.
  5. Friendliness: Over time, they may contact you with an aim of building up a rapport with you. Eventually the social engineer will ask for sensitive information when he/she feels the trust has been built up.
Stay tuned for future posts on keeping your business secure, and check out online safety tips anytime on our Good to Know website.

Posted by Katrina Blake, Risk Analyst
Email ThisBlogThis!Share to XShare to Facebook
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Five for Drive: Tips for Sharing and Collaborating with Google Drive
    Editor’s note: In November, we’re sharing tips on how your business can get the most out of Google Drive. Our final post features 5 ways you...
  • Helping small businesses grow on the web: Teaming up with Chase for Mission Main Street Grants
    We know that every small business has big ideas for what they want to do next. Maybe you’d like to expand your store, hire more employees, o...
  • New Learn with Google Fall Webinars
    We’re excited to share our fall series of Learn with Google webinars. These web events will demonstrate how to use digital marketing to buil...
  • Protect your business by understanding common phishing techniques
    Last week we introduced you to the concept of Social Engineering - manipulating people’s trust to gain confidential information. Phishing i...
  • Year in Review: Top 3 Posts - 1st Place
    Happy New Year! We've been looking at our top three most popular posts from 2012, and we're at number 1! And the winner is...Measure...
  • SMB Hangouts on Air: Is My Ad Showing?
    AdWords Specialists hosted a Hangout on Air yesterday as the first of two installments of the SMB Frequently Asked Questions Hangouts On Air...
  • Getting America’s businesses online
    Editor's note: This article is cross-posted from the Google Official Blog . The web is where we go to find things—somewhere to eat tonig...

Categories

  • AdSense
  • AdWords
  • Adwords Express
  • Apps Marketplace
  • Business Photos
  • Chromebooks
  • consumer surveys
  • Enhanced Campaigns
  • Events
  • Gmail
  • GoMo
  • Google AdSense
  • Google AdWords
  • Google Analytics
  • Google App Engine
  • Google Apps
  • Google Apps Marketplace
  • Google Calendar
  • Google Docs
  • Google Forms
  • Google Maps
  • Google Offers
  • Google Places
  • Google Sites
  • Google Tags
  • Google+
  • Google+ stories
  • googlenew
  • Help Desk Hangouts On Air
  • Hotpot
  • Learn with Google
  • mobile
  • Newsletter
  • Online security
  • Picasa
  • Street View
  • TalkBin
  • Webmaster Academy
  • YouTube

Blog Archive

  • ►  2013 (45)
    • ►  November (1)
    • ►  October (4)
    • ►  September (1)
    • ►  August (2)
    • ►  July (5)
    • ►  June (2)
    • ►  May (9)
    • ►  April (3)
    • ►  March (4)
    • ►  February (4)
    • ►  January (10)
  • ▼  2012 (120)
    • ►  December (15)
    • ►  November (9)
    • ►  October (15)
    • ►  September (13)
    • ►  August (10)
    • ►  July (3)
    • ►  June (10)
    • ►  May (17)
    • ▼  April (10)
      • Help Desk Hangouts: Getting to know Chromebooks
      • Google Apps keeps music companies humming
      • Reduce, Reuse, Recycle and...Re-think
      • Helping your business play big on YouTube
      • Help Desk Hangouts: Engaging with your customers u...
      • Protect your business by understanding common phis...
      • Help Desk Hangouts: Get found on Google with Place...
      • Protect your business by understanding common soci...
      • A fast, accurate, and affordable way to do online ...
      • Get closer to your customers with Google+
    • ►  March (9)
    • ►  February (7)
    • ►  January (2)
  • ►  2011 (70)
    • ►  December (3)
    • ►  November (2)
    • ►  October (6)
    • ►  September (3)
    • ►  August (2)
    • ►  July (1)
    • ►  June (5)
    • ►  May (12)
    • ►  April (9)
    • ►  March (8)
    • ►  February (12)
    • ►  January (7)
  • ►  2010 (104)
    • ►  December (25)
    • ►  November (24)
    • ►  October (17)
    • ►  September (20)
    • ►  August (18)
Powered by Blogger.

About Me

Unknown
View my complete profile