openPR Logo
Press release

The watering hole, piggybacking, dumpster diving, and other social engineering attacks threatening employees

03-21-2023 10:20 AM CET | Business, Economy, Finances, Banking & Insurance

Press release from: Nord Security Inc.

The watering hole, piggybacking, dumpster diving, and other

Cybersecurity expert shares 10 intricate social engineering techniques that can harm anyone and ways to prevent them from happening

Social engineering attacks use human nature to their advantage, preying on our trust, greed, fear, curiosity, and even our desire to help others. A study shows that 75% of respondents believe that social engineering and phishing attacks are the biggest danger to cybersecurity at their company. Cybersecurity threats are evolving, and while the incidence of traditional attacks may decrease, more sophisticated ones will prosper. Staying alert and being educated are the keys to staying safe.

Carlos Salas, an engineering manager at NordLayer, shares 10 social engineering techniques that hackers may use to target both individuals and organizations. According to Salas, "Social engineering is one of the easiest ways to get access to sensitive data, especially when employees haven't been trained on how to recognize and combat it. Because every member of the organization is a potential target, with interactive and informative training, such attacks can be stopped." Below, he shares his expertise on how to avoid any potential loss and examples of such attacks.

Baiting
Baiting attacks use a false promise to rouse a victim's greed or curiosity. Social engineers use bait to lure users into a trap that steals their personal information or infects their systems with malware. For example, infected USB memory sticks are left in parking lots or offices, tempting people to see what's on them. Don't ever try to check what is inside the unattended USB devices, and make sure to report it to the security team if you see them lying around.

Pretexting
An attacker uses a made-up scenario (a pretext) to provoke an employee to disclose sensitive information, for example, login details to IT systems or personal information about other employees. It often requires researching the target prior to the attack to make the scenario plausible and to gain the trust of the victim. If that happens, the most important thing is to verify the identity, avoid sharing personal details and report the incident to the IT team.

Watering hole
In a watering-hole attack, the attacker infects an existing website or creates a fake website that mimics an existing website often used by a certain group of people, for example, employees of a company. The goal is to infect a targeted user's computer and gain access, for instance, to the network at the target's workplace. To protect yourself, only access websites that have HTTPS in the URL code, update your software, and use malware-detection tools.

Quid pro quo
Quid pro quo attacks rely on people's sense of reciprocity. Attackers offer services, assistance, or other benefits in exchange for information. For example, someone pretending to be an IT expert might ask for your device's login credentials in order to make that device run faster. In order to prevent information loss, verify the identity of IT technician, question methods and tools, and use anti-malware software.

Scareware
Scareware is a form of malicious software, usually a pop-up that warns that your security software is out of date or that malicious software has been detected on your machine. It fools victims into visiting malicious websites or buying worthless antivirus software. Use an ad-blocker and reputable antivirus and avoid clicking on pop-ups.
Tailgating and piggybacking
Tailgating and piggybacking involve an attacker accessing a secure or restricted area. For instance, a person might tailgate an employee into the office, claiming to have lost their access card, pretending to be a repair technician, or holding coffee cups in both of their hands and asking for your help with the door.

Vishing
Vishing, also known as "voice phishing," is a practice of eliciting information or attempting to influence someone via the telephone. In 2021 alone, TrueCaller reports that Americans lost $29,800,000 to phone frauds. Avoid responding to emails or social media messages that ask for your phone number. Remember that your colleagues will never call you at home asking you to transfer funds or any other sensitive information.

Shoulder surfing
Shoulder surfing is the bad actor watching their unsuspecting victim while they're entering passwords and other sensitive information. But this technique doesn't have to be used at close range, literally looking over their shoulder. It could be employed by the hacker from a distance if they use binoculars or hidden cameras, for example. In order to eliminate the risk of being snooped on this way, make sure to use strong, single sign-on passwords, biometrics, and 2-factor authentication.

Dumpster diving
Dumpster diving is when attackers go through your company's trash looking for documents containing sensitive or confidential information. Always use a file shredder to prevent information leakage.

Deep Fakes
Deepfakes ("deep learning" + "fake") are synthetic media in which a person in an existing image, audio, or video is replaced with someone else's likeness. It is possible to detect deep fakes. Make sure to check for shadows appearing on the face, notice if eyes are blinking and try to detect wrinkles. Beware of poor-quality phone call recordings and pay attention to how letters like f, s, v, and z are pronounced - software has trouble differentiating them from noise.

6192 Coastal Highway, Lewes, Delaware 19958

Email evita.anilionyte@nordsec.com

ABOUT NORDLAYER
NordLayer - an adaptive network access security solution for modern businesses. It helps organizations of all sizes to fulfill scaling and integration challenges. Moving towards an ever-evolving SSE ecosystem, NordLayer is quick and easy to implement with existing infrastructure, hardware-free, and designed with ease of scale. As a cloud-native solution with an easy-to-use interface, NordLayer offers protection to businesses of any size, complexity, or work model, including remote or hybrid workplaces. More information: nordlayer.com

This release was published on openPR.

Permanent link to this press release:

Copy
Please set a link in the press area of your homepage to this press release on openPR. openPR disclaims liability for any content contained in this release.

You can edit or delete your press release The watering hole, piggybacking, dumpster diving, and other social engineering attacks threatening employees here

News-ID: 2983202 • Views:

More Releases for NordLayer

Zero Trust Software Defined Perimeter Market 20.30% CAGR Growth Insights from Zs …
The Zero Trust Software-Defined Perimeter (SDP) market is experiencing significant growth as organizations increasingly recognize the need for enhanced security measures in an evolving digital landscape. Traditional perimeter-based security models are becoming obsolete as remote work and cloud adoption proliferate. The Zero Trust model operates on the principle that no one, whether inside or outside the organization, should be trusted by default. This paradigm shift is driving the adoption of
Zero Trust Software Defined Perimeter Market 20.30% CAGR Growth Opportunities Hi …
The Zero Trust Software-Defined Perimeter (SDP) market is experiencing significant growth as organizations increasingly recognize the need for enhanced security measures in an evolving digital landscape. Traditional perimeter-based security models are becoming obsolete as remote work and cloud adoption proliferate. The Zero Trust model operates on the principle that no one, whether inside or outside the organization, should be trusted by default. This paradigm shift is driving the adoption of
Cloud VPN Market Is Going to Boom | Major Giants NordLayer, Perimeter 81, Cisco
HTF MI just released the Global Cloud VPN Market Study, a comprehensive analysis of the market that spans more than 143+ pages and describes the product and industry scope as well as the market prognosis and status for 2025-2032. The marketization process is being accelerated by the market study's segmentation by important regions. The market is currently expanding its reach. Major Giants in Cloud VPN Market are: NordLayer, Perimeter 81, Cisco, Google,
Zero Trust Software-Defined Perimeter Market Industry Dynamics and Contributions …
The Zero Trust Software-Defined Perimeter (SDP) market is rapidly evolving, driven by the increasing need for enhanced security measures in an era of relentless cyber threats. As organizations worldwide continue to shift towards remote work and cloud services, the relevance and scope of Zero Trust architecture have become paramount. This innovative security model, which operates on the principle of ""never trust, always verify,"" offers robust protection for sensitive data and
Global Zero Trust Software-Defined Perimeter Market Size, Share and Forecast By …
𝐔𝐒𝐀, 𝐍𝐞𝐰 𝐉𝐞𝐫𝐬𝐞𝐲- According to the Market Research Intellect, the global Zero Trust Software-Defined Perimeter market is projected to grow at a robust compound annual growth rate (CAGR) of 14.43% from 2024 to 2031. Starting with a valuation of 8.18 Billion in 2024, the market is expected to reach approximately 18.37 Billion by 2031, driven by factors such as Zero Trust Software-Defined Perimeter and Zero Trust Software-Defined Perimeter. This significant
Opportunities for the Global Zero Trust Maturity Model Solutions Market to reach …
The Zero Trust Maturity Model Solutions Market 2024 Forecast to 2031 research provides accurate economic, global, and country-level predictions and analyses. It provides a comprehensive perspective of the competitive market as well as an in-depth supply chain analysis to assist businesses in identifying major changes in industry practices. The market report also examines the current state of the Zero Trust Maturity Model Solutions industry, as well as predicted future growth,