Facebook iconTwitter icon
B2B-Network:
How to Protect Yourself Against Social Engineering Attacks
How to Protect Yourself Against Social Engineering Attacks
Time icon31 October 2018, 15:10 pm

Social engineering is the most dangerous vector of attack that is available to hackers. It can be executed through a phone call, an email phishing attack or a physical intrusion into your building by an individual claiming false credentials. 

Social engineering involves the art of manipulating employees into doing things that are related to security such as revealing confidential information or giving away personal computer access. Instead of using computer systems or networks, social engineers utilise psychological tricks on employees to gain access to small pieces of information. Here are the main tips that can help you improve your defences against social engineering. 

 

Acceptable Use Policies 

You should develop an acceptable use policy that is both reasonable and effective. It should include safe website searching policies. Also, enforcing non-compliance regulations in your company might prove to be an excellent idea, but it might not be effective or enough to deter company employees from not complying with your guidelines. 

Any company cannot afford to block all the web traffic that is not on its whitelist of the approved sites since it is not practical and can completely kill your employee’s moral. Most employees will want to be free while checking their online banking statements or emails. That means you should try as much as possible to craft a reasonable policy while still prioritising your security. 

 

Embracing Healthy Scepticism 

An essential thing that you and your employees can do to prevent the effects of social engineering is to embrace a healthy scepticism and always try to be vigilant. Being aware of the common hacking tricks can put you and your employees one step ahead of the game. Educate your employees not to give out their confidential information as well as the company's essential data, whether it is through an email, phone call or in-person. Before giving any information, they should first verify the identity of the individual requesting for information.

Loader