Anatomy of a social engineering scam
Hojt Communication is a consulting company focused on our clients need to rapidly bring the right product to the right market. We stand out due to our ability to combine skills in strategy, implementation, operations and technology with deep understanding about the connected world and the new levels of security and privacy protection that world brings.
vision,strategy,product,market,business development,marketing,mobility,Internet of Things,IoT,Security
21885
post-template-default,single,single-post,postid-21885,single-format-standard,stockholm-core-2.4.3,select-child-theme-ver-1.0.0,select-theme-ver-9.8,ajax_fade,page_not_loaded,,qode_menu_,wpb-js-composer js-comp-ver-7.5,vc_responsive

Anatomy of a social engineering scam

64e5968a-aee6-4b44-b99e-ea9888b5be73.jpg

A convincing social engineering scam which targeted Centrify employees in 2014 and 2015 can be avoided if companies take steps to carefully check emails which ask for money transfers, says CEO Tom Kemp.

Sourced through Scoop.it from: www.computerworld.com.au

Social engineering is the most successful method to breach security. Again, and again you read about it in the news. Some simple ways to minimize the risk:

1. Never send orders, wire transfer instructions over a public channel like email. Use an internal system/app for that.

2. All transactions should be multi-factor authenticated.

3. Be paranoid. If it looks out of the ordinary, call and verify

4. Keep the employees on their toes. Set up a breach bounty program where you do unannounced tests of their alertness, and give bonuses to the ones that catch the bogus mail.

See on Scoop.itSecure communication

Tags: