Tips: Watch Out For Criminal Social Engineers

Halock Security Labs, an information security organization, warns all companies with a physical location and Internet presence to make sure security policies and procedures are strictly enforced during the holidays, because criminal social engineers are out shopping for others' confidential data. Offices are particularly vulnerable in times of increased social activity, like the holidays, because employees are accustomed to seeing new faces, new vendors, receiving many e-mail solicitations and disclosing personal financial information online while shopping.

Halock specializes in ethical hacking and social engineering -- at a client's request, to test a company's physical and Internet vulnerabilities. In one recent instance, a Halock employee was able to enter the corporate headquarters of one of the country's largest financial institutions and gain almost complete access to the company's sensitive data simply because he was carrying a cake.

"When asked what he was doing, our man simply said. 'I have cake,' and nobody wants to impede the progress of a nice looking cake -- right?!" said Jeremy Simon, Halock's CTO.

"Social engineering is typically defined as the skillful exploitation of the natural human tendency to trust. This engineering can come through an actual physical interaction, through an e-mail, as in phishing schemes or online, through falsified websites. The criminal social engineer is out to con someone into giving up credentials that can ultimately be used to generate or gain access to sensitive information," said Terry Kurzynski, CEO, Halock Security Labs. "And during the holidays companies are inundated with strange names and faces in the form of guests, delivery people, greeting cards, special offer Web sites -- the list is endless. Some of these guests are quite unwelcome," he adds.

What can a company do to make sure that they don't inadvertently let the Grinch spoil Christmas?

Here are a few techniques that Halock Security Labs recommends:

  • Stick to your policies and procedures. Carefully track visitors coming and going into your facility. If you don't recognize someone or they are not displaying the correct badge or ID, ask them their purpose and who they are working with. It will become clear if they belong within the walls of your organization.
  • If your organization has a clean desk policy and/or a system lock policy for unattended systems, be sure to enforce those policies. Shred documents that contain confidential or sensitive data. This goes for home and work. Identity thieves pray off of the garbage can. Criminals that have socially engineered their way into an organization will be looking for low hanging fruit including paper documents or systems left unattended. They may try to quickly install a malware program on systems left unlocked and potentially gain administrative rights remotely to that machine.
  • As for your online shopping this holiday season, be sure to locate the little picture of a lock the on bottom of Web pages whenever you provide private information, including credit card numbers, name and address. Be especially careful of phishing attempts to get your password, social security number, account number, or credit card number based on an e-mail that has arrived in your inbox. Never click on hyperlinks in e-mails unless the message comes from a trusted source (and even then, be careful.) And don't ever give out your password, credit card number or social security number via e-mail.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3