Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
IT Managers: Are You Keeping Up with Social-Engineering Attacks?
Newest First  |  Oldest First  |  Threaded View
BrianN060
100%
0%
BrianN060,
User Rank: Ninja
8/7/2018 | 1:27:58 PM
Re: Why do social engineering attacks continue to succeed?
"There is an area of corporate responsibility that is largely neglected..." True, but don't leave out personal responsibility.  It's not all up to corporations or the government (and in a democracy, aren't we the government as well as the governed?).  There's also the aspect of corporate policies in hiring practices.  If they don't hire people of integrity, willing to take responsibility, they'll get what they deserve. 

The prevalent concern of finding qualified people to fill positions plays a role - stop prioritizing degrees, certifications and experience in someone else's organization; do your own aptitude testing and hire people you can train to do what your organization needs doing.  If you start with good people who want and know how to learn, you've got a real human resource, not just an HR commodity.  The solution to social engineering challenges isn't artificial intelligence, it resides in the ability of individuals to distinguish fact from fallacy, reason from rhetoric. 

Want a good way to test your people's ability to recognize a social engineering attack?  Have them watch the political ads in this election cycle.  If they can't spot all the techniques used to manipulate perceptions there, they wouldn't know an SE attack if it painted itself purple, and danced naked on top of a harpsicord singing "Social engineering attacks are here again!" (to paraphrase Edmond Blackadder). 
REISEN1955
0%
100%
REISEN1955,
User Rank: Ninja
8/7/2018 | 7:14:04 AM
Re: Why do social engineering attacks continue to succeed?
Now we have a new threat....among about 520 other threats.  I am beginning to believe it is impossible for IT managers and staff to keep up with the invasive techniques of hackers and threat actor groups.  All they have to do is sit around and THINK about ways to penetrate a network - and then do it.  Time is on their side and we are generally reactive to their threats.  It is a CATCH-UP game forever.  Which is depressing if you think about it.  AI will help over time and we have good tools now that catch some, not all, threats.  That is probably the BEST we can do.  We cannot catch everything, we will just have to try to catch whatever we can and keep at it.  
Dave Moore
100%
0%
Dave Moore,
User Rank: Apprentice
8/6/2018 | 7:49:04 PM
Why do social engineering attacks continue to succeed?
There is an area of corporate responsibility that is largely neglected, but represents one of the most pressing issues in the world today: the need to teach the underserved public-at-large how to be safe on the Internet.

We have $600 billion in cybercrime because effective education of the general public in Internet safety is virtually nonexistent. Society has not been taught how to avoid online scams. Internet criminals victimize millions of people every day, knowing they do not know how to defend themselves. To quote H.G. Wells, "Civilization is in a race between education and catastrophe."

The Internet Safety Group is doing something about it TODAY. Nobody else is doing what we are doing: providing understandable, actionable, motivational LIVE Internet safety community training for everyone.

Please visit the Kickstarter page
<a href="https://www.kickstarter.com/projects/1274121448/fight-the-internet-bad-guys-and-win?ref=nav_search&result=project&term=internet%20safety">
Internet Safety Group Fight The Internet Bad Guys & Win!

And look. Consider. Contribute. Get involved. Share the word.

Thank you!

Dave Moore


Edge-DRsplash-10-edge-articles
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
News
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Commentary
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Take me to your BISO 
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-28588
PUBLISHED: 2021-05-10
An information disclosure vulnerability exists in the /proc/pid/syscall functionality of Linux Kernel 5.1 Stable and 5.4.66. More specifically, this issue has been introduced in v5.1-rc4 (commit 631b7abacd02b88f4b0795c08b54ad4fc3e7c7c0) and is still present in v5.10-rc4, so it&acirc;&euro;&trade;s l...
CVE-2021-21428
PUBLISHED: 2021-05-10
Openapi generator is a java tool which allows generation of API client libraries (SDK generation), server stubs, documentation and configuration automatically given an OpenAPI Spec. openapi-generator-online creates insecure temporary folders with File.createTempFile during the code generation proces...
CVE-2021-29022
PUBLISHED: 2021-05-10
In InvoicePlane 1.5.11, the upload feature discloses the full path of the file upload directory.
CVE-2020-27226
PUBLISHED: 2021-05-10
An exploitable SQL injection vulnerability exists in &acirc;&euro;&tilde;quickFile.jsp&acirc;&euro;&trade; page of OpenClinic GA 5.173.3. A specially crafted HTTP request can lead to SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability.
CVE-2020-27229
PUBLISHED: 2021-05-10
A number of exploitable SQL injection vulnerabilities exists in &acirc;&euro;&tilde;patientslist.do&acirc;&euro;&trade; page of OpenClinic GA 5.173.3 application. The findPersonID parameter in &acirc;&euro;&tilde;&acirc;&euro;&tilde;patientslist.do&acirc;&euro;&trade; page is vulnerable to authentic...