Hackers find successful cyber target: Humans

This piece is presented by SDN Communications.

What’s the path of least resistance to get into business systems and access data? The employees.

That’s why most hackers have moved beyond breaking into systems and are now trying to trick users through social engineering. And by most hackers, we’re talking a whopping 97 percent of them according to Symantec Security Response.

There are three basic types of social engineering tactics:

  • Phishing: sending emails that appear to be from a reputable source to gain personal information.
  • Vishing: the same as Phishing but through voice, such as “phone spoofing”
  • Impersonation: falsely representing someone in person to gain information or access to a company or computer system.

These tactics work because they rely on human error to be successful and, well, we’re all human. But with some training, companies can reduce the probability that their employees are the gateway to a successful attack.

To help you do that, SDN Communications lays out four ways to spot a social engineering attack in one of its three cybersecurity posters. Download and display them all in your business to raise cyber awareness.

 

Hackers find successful cyber target: Humans

What’s the path of least resistance to get into business systems and access data? The employees.

News Tip

Have a business news item to share with us?

Scroll to top