1 min read

Top Tip Thursday: Protect yourself from social engineering

Top Tip Thursday: Protect yourself from social engineering

Although cyber security and technological defences have developed over the years, making it harder for cyber criminals to commit crimes, hackers are progressively using social engineering tactics to exploit people online.

What is social engineering and how does it work?

Social engineering is how cyber criminals coerce individuals into revealing their confidential information through malicious activities. They can also manipulate people into transferring money or compromise their own security in order to gain access to systems.

There are many ways in which a cyber-criminal performs a social engineering attack. One of the most common attack types is phishing and SMSishing which we have talked about. For a recap, phishing attacks are used to lure victims into sharing personal information or downloading malware via email or text, by claiming to be from a trusted person or organisation.

Other common techniques include:

  • Pharming – this involves scammers diverting web traffic from verified sites to clones contained with viruses. To avoid falling victim to a pharming attack, ensure you verify links by checking the address before you click it.
  • Baiting – deceiving victims by offering discounts/freebies to infect their devices. To protect yourself from baiting, make sure you don’t open any suspicious emails. There are various ways in spotting unsafe emails; there may be weird formatting or spelling errors. If you spot anything questionable, it is best not to open the email.
  • Scareware – includes bombarding internet users with threats or false claims stating that their system is infected with viruses, convincing users to download software that is actually malware. If this ever happens to you, do not panic! Ensure that the message comes from a verified source; if it does not, then it is most likely scareware.

How we can help

Managing your digital security can be time-consuming and bewildering. At Infuse, we understand the impact this can have on both businesses and individuals, and we’re here to provide you with a complete solution. To speak with one of our experts, please get in touch today.

Top Tip Thursday: Password protecting your Excel spreadsheets

Top Tip Thursday: Password protecting your Excel spreadsheets

Whether it’s highly sensitive data, a confidential project or personal information you’d rather to hide, a password protected Excel workbook will...

Read More
Top Tip Thursday: Increase your cyber security with a password manager

Top Tip Thursday: Increase your cyber security with a password manager

With the many rules that come along with having a strong password such as using a mix of characters and incorporating shorts codes/acronyms, it can...

Read More
Top Tip Thursday: Stay one step ahead of cyber criminals by backing up your data

Top Tip Thursday: Stay one step ahead of cyber criminals by backing up your data

However, stealing data is not always the main goal for hackers, sometimes they want to corrupt or erase files. Keeping your information in an...

Read More