informa
/
Slideshow

8 Ways Businesses Unknowingly Help Hackers

From lengthy email signatures to employees' social media posts, we look at the many ways organizations make it easier for attackers to break in.
A Picture Says 1,000 Words
Out of Office: Watch What You Say
Overly Detailed Job Postings
What's in an Email Signature?
Failing to Verify Callers
A New Kind of Credential Theft
Watch Out for Gen Z
Poor Application Security
What You Can Do
1/9

Most of your employees likely know better than to send a password via email or open a strange attachment from someone they don't know. But do they know better than to post photos of their badges on social media or include details about internal software in job descriptions?

"I see this all the time, and this is what makes my job as a simulated attacker so much easier," says Stephanie Carruthers, global social engineering expert at IBM's X-Force Red, who goes by "Snow."

To be sure, there are many ways organizations and their employees unknowingly give cybercriminals a helping hand. Some of the errors are subtle, involving email signatures and out-of-office messages, points out Chris Hadnagy, founder and CEO of Social-Engineer. Others are bolder, involving social media. 

"You would think in 2019 we wouldn't see this," he says, explaining how even photos from office holiday parties can expose sensitive details. "There's so much I can tell from these pictures." Attackers looking to break in can learn plenty with simple Internet research, and oftentimes, the people sharing helpful information aren't aware they're doing anything wrong.

Here, security experts share the most common and consequential ways organizations unknowingly leave themselves vulnerable to cybercrime. Did they leave anything off the list? Feel free to weigh in and share your additions in the Comments section, below.

Edgepromohorizontal.jpgCheck out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "Why Clouds Keep Leaking Data."

 
Next slide
Recommended Reading: