How does social engineering work?
In a typical social engineering attack, a cybercriminal will communicate with the intended victim by saying they are from a trusted organization. In some cases, they will even impersonate a person the victim knows.
If the manipulation works (the victim believes the attacker is who they say they are), the attacker will encourage the victim to take further action. This could be giving away sensitive information such as passwords, date of birth, or bank account details. Or they might encourage the victim to visit a website where malware is installed that can cause disruptions to the victim's computer. In worse case scenarios, the malicious website strips sensitive information from the device or takes over the device entirely.
Why is social engineering so dangerous?
One of the greatest dangers of social engineering is that the attacks don't have to work against everyone: A single successfully fooled victim can provide enough information to trigger an attack that can affect an entire organization.
Over time, social engineering attacks have grown increasingly sophisticated. Not only do fake websites or emails look realistic enough to fool victims into revealing data that can be used for identity theft, social engineering has also become one of the most common ways for attackers to breach an organization's initial defenses in order to cause further disruption and harm.
How do I protect myself and my organization against social engineering?
While psychological attacks test the strength of even the best security systems, companies can mitigate the risk of social engineering with awareness training.
Consistent training tailored for your organization is highly recommended. This should include demonstrations of the ways in which attackers might attempt to socially engineer your employees. For example, simulate a scenario where an attacker poses as a bank employee who asks the target to verify their account information. Another scenario could be a senior manager (whose email address has been spoofed or copied) asks the target to send a payment to a certain account.
Training helps teach employees to defend against such attacks and to understand why their role within the security culture is vital to the organization.
Organizations should also establish a clear set of security policies to help employees make the best decisions when it comes to social engineering attempts. Examples of useful procedures to include are:
- Password management: Guidelines such as the number and type of characters that each password must include, how often a password must be changed, and even a simple rule that employees should not disclose passwords to anyone--regardless of their position--will help secure information assets.
- Multi-factor authentication: Authentication for high-risk network services such as modem pools and VPNs should use multi-factor authentication rather than fixed passwords.
- Email security with anti-phishing defenses: Multiple layers of email defenses can minimize the threat of phishing and other social-engineering attacks. Some email security tools have anti-phishing measures built in.