7 Ways Hackers Target Your Employees
One employee under reconnaissance by cyberattackers can put your whole business at risk. Where are they being targeted, and what should they know?
Already have an account?
Cybercriminals are testing the strength of your organization's defensive wall, looking for the one crack they need to launch their attacks. Oftentimes that flaw isn't a "what," but a "who."
Employees only need to download a bad attachment, click a malicious link, or give attackers one piece of information they need to break in. Security is a business-wide responsibility.
"Companies need to realize if their employees are picking up the phone and answering emails, they are making security decisions every day that can affect the company," says Michele Fincher, COO for Social-Engineer, Inc. "They don't realize how many good decisions employees need to make to be secure."
Addressing the importance of security during annual training sessions isn't enough, says Fincher. "If you only talk about it once a year, you're doing the staff a grave disservice."
Social engineering attacks also make it harder to differentiate legitimate from malicious activity. In the past, cybercriminals needed more technical skills to launch attacks. These days, they can wreak havoc with social network browsing, phone calls, and emails. They can conduct surveillance without raising red flags.
As Social-Engineer, Inc. CEO Chris Hadnagy explains, "There's no bar for entry for an attacker."
Here are seven common strategies attackers use to target employees. Share these with your teams to inform them of today's dangers and where hackers may be hiding.
About the Author
You May Also Like
A Cyber Pros' Guide to Navigating Emerging Privacy Regulation
Dec 10, 2024Identifying the Cybersecurity Metrics that Actually Matter
Dec 11, 2024The Current State of AI Adoption in Cybersecurity, Including its Opportunities
Dec 12, 2024Cybersecurity Day: How to Automate Security Analytics with AI and ML
Dec 17, 2024The Dirt on ROT Data
Dec 18, 2024