Social Engineering: People Hacking

Size: px
Start display at page:

Download "Social Engineering: People Hacking"

Transcription

1 Social Engineering: People Hacking Historically speaking, humans have always been great social engineers. You d have to agree that it probably started out around the time when the first caveman husband told his wife that she wasn t fat and, in fact, looked fitter than her wedding day in that latest dinosaur-skin dress of hers. While this is, debatably, less malicious, history has witnessed more spiteful incidents of social engineering. As far back as the 1600s, George Psalmanazar falsely claimed to be the first Formosan to visit Europe and even wrote a successful book on Formosa. Jefferson Smith, better known as Soapy Smith, sold bars of soap to onlookers duping them into believing that some of the lucky bars had money strung to them. Victor Lustig is best known as the man who sold the Eiffel Tower twice. More recently, Frank Abagnale, whose exploits were immortalized in books and movies, committed forgery in 26 countries and assumed multiple identities, all before he was 21 years of age. Manipulation of words or actions to build up a false sense of trust and confidence and ultimately evoke a desirable response is known as social engineering. This, however, has taken a sinister turn in the modern world where we depend on technology and lightning-fast communications. The rules are still the same, but the consequences are more severe. People Hacking Social engineering aims to exploit the weakest link in information security people. Just as in historical examples in which people were manipulated into meeting one s ends, social engineering is grounded in the same principle. Yet social engineering does not necessarily need the use of technical methods. By nature, people tend to be helpful and polite. Social engineering techniques take advantage of this intrinsic nature to manipulate people into divulging sensitive information. In fact, many people who divulge information do not really think they are even giving away anything too critical. The social engineer s goal then is to put pieces of information, gathered from various sources, together. In ancient times, assassins used extremely subtle information gathering techniques and spent several months in preparation for the final assassination attempt. Pieces of seemingly innocuous information were assembled in this pursuit and ultimately led to fatal consequences for a number of kings and men of power. Social engineers in the modern day use a very similar modus operandi. Organizations today spend heavily on their information security infrastructure and employ the latest and best technological advancements in security. However, security is only as strong as the weakest link. If the human firewall is weak, an organization will fall prey to the oldest tricks in the book. The expensive technical security infrastructure will be rendered useless if social engineers can have their way through people hacking.

2 Old Dog, New Tricks To combat social engineering, it is important to understand the tricks that social engineers use. One needs to know the way a social engineer thinks and operates to protect against the threat of social engineering. Let us take a look at some of the common methods employed by social engineers: Pretexting Social engineers often create a believable pretext to dupe their target into divulging precious sensitive information. The creation of such a pretext is often the result of serious planning and homework. The main objective for the social engineer is to be able to establish a sense of legitimacy in the mind of the target victim. Human emotions like fear, guilt, sympathy, confusion, intimidation, flattery, and friendship are a social engineer s best friends when pretexting. For instance, nobody would want to mess with an enraged vice president, especially one that you ve never even seen before. A fire marshal coming in to inspect your workplace would obviously be an intimidating uniform-clad authority to challenge. It could sometimes be as simple as a social engineer putting up a pitiable face asking for your help, without which he/she would be completely lost. A typical example of pretexting is a social engineer pretending to call from your cellular telephone provider informing you that you need to pay for $5000 worth of international calls that it claims you made. Since you are completely taken aback at the accusation, your thoughts are in disarray. The caller then steps up to provide the much-needed support by telling you that he/she will waive the amount you owe and place a hold on your account to prevent further calls of the kind. However, he/she tells you that you need to confirm your credit card details for identification purposes. You then quickly provide your card details, and the social engineer s job is done. Social engineering techniques in pretexting are highly evolved today. Social engineers use acronyms and company jargons to target organizations, lending great credibility and believability. One technique involves social engineers recording the target organization s on-hold music. The social engineer then calls someone at the organization posing to be a co-worker at the same organization. He/she then tells the person to hold the line because there is another call on line two. The on-hold music is then played to the listener who then is inclined to believe that the caller works for the same organization. The use of Voice over IP (VoIP) technology today even allows a caller to spoof the caller ID to show up as a number from within the target organization. Such meticulous arrangements could fool even the well-prepared. Phishing and Spear Phishing Phishing techniques have become all too common. It is likely that anyone who owns an account has received at least one phishy . These s look highly legitimate and solicit personal information. Often, these s will appear to come from commonly used services and websites like ebay and PayPal. The may have a link that takes the unsuspecting target who clicks on it to a webpage that looks strikingly similar to the original. The webpage would contain a form that asks for all levels of personal and account details.

3 Again, human emotions play a critical role in phishing. Social engineers often add presumed credibility on their s by asking the target to validate his/her account, failing which it will be blocked permanently. Alternatively, the e- mail could state that the account has already been blocked and that the recipient needs to click this link to go to the activation page. Vishing The Nigerian scam, also called the 419 scam, has been a menace in the history of social engineering. The scam uses an e- mail to persuade the target into divulging advance sums of money with the lure of an unclaimed will or lottery money amounting to millions of dollars. This scam has utilized a wide array of variations over the years, to great success. Spear Phishing techniques are very similar to phishing, except that these are more targeted and often directed at organizations. Legitimacy, in this case, is established with the help of information gathering. For instance, a social engineer could find out that an organization uses ADP services for payroll. The social engineer would then craft his/her spear phishing as if it was being sent by ADP to employees within the target organization who are on payroll via ADP. The would state that the employee s payroll was not processed and that this situation could be sorted by clicking this link and logging in. Few individuals would want to mess around with their payroll. A relatively new development in social engineering that is fast gaining ground is vishing. Vishing uses interactive voice response (IVR) systems to dupe a target into divulging personal information such as card details, Personal Identification Numbers (PINs), and Social Security numbers. Typically, legitimate IVR messages and commands are recorded by social engineers and then played back over a toll free number that targets are enticed to call using an advertisement/notification of some sort. Alternatively, social engineers could design an automated calling system wherein a string of telephone numbers are fed into the system and the system sequentially calls the numbers in an automated manner. The system plays a recorded message which asks a target to renew or validate his/her services with a popular bank/credit union/service. The IVR commands are then played to make the target enter the much-valued personal information. Malicious Code Social engineers at times also send out s that have attachments enticing the target to open them. The pretext could be a failed UPS package delivery, an important work-related file, free Britney Spears wallpaper, a critical anti-virus upgrade from your tech support team, or even an I love you letter. The target that succumbs to the message opens the attachment which contains malicious code like a keylogger, Trojan, backdoor, virus, or worm. Malicious code has evolved to become highly intelligent these days. Such code is designed to detect and respond to a target s suspicions and relevant actions.

4 Dumpster Diving A great supplement to technical methods of social engineering is dumpster diving. The technique involves literally rummaging through the target s garbage for confidential information. While this technique may sound dirty, it is a highly rewarding one. One possible reason for the widespread use of this technique is its non-technical nature. Social engineers may even use pretexts to support their dumpster diving initiatives. These include posing as a salesperson, a law enforcement officer, pest control, a repairman, or a technician. Posing as a cleaner could prove to be one of the best pretexts a social engineer can adopt. A cleaner usually comes in after work hours when there are no suspicious eyes scanning the workplace. A social engineer usually looks for targeted information using dumpster diving. This includes confidential reports, sales forecasts, salary data, network diagrams, source code, configurations, internal communications, post-it notes, and discarded applications. Something as simple as a full departmental telephone list is often a social engineer s dream. Shoulder Surfing and Piggybacking As the name suggests, shoulder surfing involves stealthily observing the target to obtain or deduce confidential information. This is usually done to observe password keystrokes on a keyboard or a PIN entered into an ATM machine. Expert social engineers have even been known to observe and memorize signatures. A social engineer does not necessarily need to have a full view of a keyboard or an ATM keypad. This would actually be undesirable, considering that social engineers try to be inconspicuous. Positional awareness of keys can be a helpful tool for social engineers. A technique that follows similar principles is called piggybacking. Social engineers use piggybacking to get physical access to premises. Preying on common politeness, this is generally accomplished by stealthily slipping into the premises along with another authorized individual, when the authorized individual is kind enough to hold the door open for the social engineer. Quid Pro Quo The quid pro quo technique involves giving something to get something in return. A survey 1 once found that more than 70% of people would reveal their computer password in exchange for a bar of chocolate. Even more surprising, 34% of the respondents of the survey volunteered their password without even needing to be bribed. As an example of this technique, a social engineer would call a target posing as a technical support agent. The social engineer finds a harassed soul who is grateful that someone is calling back from his/her service provider. The social engineer then directs the target to type some commands that gives him/her full access to the target s computer or even has malicious code installed onto it.

5 Baiting Imagine that you re finishing up with lunch in the break room and you notice a CD lying on a table. The CD has your company s logo on it and has Layoffs 2009 Private and Confidential printed on it. You re all alone in the room and decide to take the CD to your office. You open the CD and you find that it s exactly what you thought it was. The CD contains an excel file that has a list of employees, perhaps the ones you think are to be laid off. The names of the excel file are not familiar, but you work for a big organization so you assume they are all legitimate. You are thrilled to see that your name is not on the list. This is a perfect baiting scenario. A script installed a keylogger on your computer when you opened the excel file. All your keystrokes are now being logged and sent via lightweight text s to a social engineer sitting in a remote location. Baiting is a highly potent weapon in a social engineer s arsenal and can have devastating effects for a target. Con Repellent While social engineering is a very real and ominous threat to organizations, employing the right countermeasures in the right way can fortify an organization very effectively against social engineering threats: Policies and Procedures Policies and procedures provide a solid foundation to counter the threat of social engineering. Having specific policies and procedures that are clear, concise, and well-documented is the first step. The critical second step is consistently enforcing these policies and procedures. Organizations should make it well-known internally that non-compliance will be dealt with strictly. Further, policies and procedures need to be highly comprehensive and all-inclusive. These need to have a long-term vision and factor in the future of the organization, including a growth in size. Training and Awareness An organization s employees are the very first line of defense against social engineering and yet are, more often than not, the weakest link. Training your employees is the best possible investment you could make to combat the threat of social engineering. An employee with an awareness of social engineering techniques will be able to proactively identify the traps and pitfalls commonly used. Employee training and awareness programs should be tailored to meet audiences of varying technical levels. The human firewall can be strengthened by making employees fully aware of the organization s policies and procedures. Targeted and focused programs are the most effective long-term tool against social engineering.

6 Social Engineering Engagements The best way to beat a social engineer at his/her game is to be one. Social engineering engagements performed by experts are highly effective in exposing your organization s vulnerability to social engineering attacks. These engagements use the same techniques used by social engineers to test an organization s level of preparedness. Any awareness and training program employed by an organization needs to have a focused direction. Social engineering engagements provide this direction. These engagements give an organization a clear picture of exactly where it is vulnerable. Awareness and training programs can then be directed to address these specific areas and ultimately lead to a well-prepared organization. Awareness Tools When using awareness and training programs, awareness tools should be employed to make the entire learning process more interesting and engaging. Articles and newsletters about security are one way of spreading awareness in an organization. Webcasts and podcasts are other tools that could be made available on the organization s intranet. Humorous posters are another means of communicating messages about social engineering. Periodic quizzes, seminars, presentations, and live demos are other successful methods of spreading awareness. An organization could also hire a team of professional social engineers to perform tests and present their results to the employees. Such interactive sessions are often entertaining, eye-opening, and highly educational. Overall, awareness tools should instill an environment of security in the organization to encourage everyone to accept security as a personal responsibility. Hack-Proof Your People Social engineering has proven to be the wake-up call for all those who believed that technology alone could solve the problem of information security. In fact, users of all security measures will always be the weakest link. While investing in your organization s information security infrastructure, do not forget to hack-proof your employees. Amateurs hack systems, professionals hack people. - Bruce Schneier References

7 ERM wants to hear from YOU. With this edition of our newsletter, we re rolling out a new format and new features. Tell us what you think! What features or topics would you like to see covered in future issues? Who else should receive this newsletter? Your feedback is welcome and encouraged. Please send your comments to editor@emrisk.com. Enterprise Risk Management: At a Glance ERM brings clients the highest level of expertise to assess and address risks, comply with standards and regulations and mitigate risks, using integrated and reasonably priced security services and solutions. Our practice provides organizations with the tools they need to address the compliance and risk management issues of today, as well as the broader and ever-increasing security challenges of the future. Services IT Security Regulatory Compliance IT Audit Computer Forensics Risk Management Attestation Certifications Certified Public Accountant (CPA) Certified Information Systems Security Professional (CISSP) Certified Information Systems Auditor (CISA) Certified Information Systems Manager (CISM) Certified Information Technology Professional (CITP) GIAC Security Essentials Certification GIAC Systems and Network Auditor Qualified Security Assessor (QSA) Approved Scanning Vendor (ASV) Some of our Clients ABN-AMRO Private Banking Bacardi-Martini, Inc. Bancafe International Banco Industrial de Venezuela Banco ITAU Bank United Caja Madrid Bank Carnival Cruise Lines, LLC CitiBank Coconut Grove Bank Commerce Bank E-data Financial Florida International University Florida Power & Light Company Heico Aerospace Helm Bank Knight Ridder Nova Southeastern University Rinker Materials Rudy, Exelrod & Zieff, LLP Seabourn Cruise Line TecniCard, Inc. The International Bank of Miami TransAtlantic Bank U.S. Century Bank For more information, visit info@emrisk.com Phone: Douglas Road North Tower, Suite 835 Coral Gables, FL 33134

End of the SAS 70 Era

End of the SAS 70 Era End of the SAS 70 Era For years businesses that outsource have relied on SAS 70 reports on the internal controls of third party providers. The standard for those reports is changing. New Standards Replacing

More information

Security Awareness: Looking Beyond Regulations

Security Awareness: Looking Beyond Regulations Security Awareness: Looking Beyond Regulations Over the years, security experts have religiously advocated that people are the weakest link in information security. Although the importance of security

More information

Banking Industry Regulations: Don t Burn A Hole In Your Pocket

Banking Industry Regulations: Don t Burn A Hole In Your Pocket Banking Industry Regulations: Don t Burn A Hole In Your Pocket If you ever mention the word compliance in a social gathering of bankers, you will evoke very animated responses from even the dullest of

More information

VoIP Security: Do You Have a Good Voice over IP?

VoIP Security: Do You Have a Good Voice over IP? VoIP Security: Do You Have a Good Voice over IP? Voice Over Internet Protocol (VoIP) services was first introduced in 2004, but it was six years later when first criminal was charged with hacking 1. The

More information

A Walk In The Clouds

A Walk In The Clouds 0101010 1010101 0101010 1010101 A Walk In The Clouds Security Issues To Watch In Cloud Computing Some things never change. From when personal computers first came around, you might remember a colleague

More information

Identity Theft: Are You Really You?

Identity Theft: Are You Really You? Identity Theft: Are You Really You? We are pleased to inform you of the final announcement that you are one of our New Year Winners of the UNITED KING- DOM ONLINE PROMO AWARDS, held on 26th January, 2009.

More information

Universities and Schools Under Cyber-Attack: How to Protect Your Institution of Excellence

Universities and Schools Under Cyber-Attack: How to Protect Your Institution of Excellence Universities and Schools Under Cyber-Attack: How to Protect Your Institution of Excellence About ERM About The Speaker Information Security Expert at ERM B.S. Software Engineering and Information Technology

More information

Guide to Preventing Social Engineering Fraud

Guide to Preventing Social Engineering Fraud Guide to Preventing Social Engineering Fraud GUIDE TO PREVENTING SOCIAL ENGINEERING FRAUD CONTENTS Social Engineering Fraud Fundamentals and Fraud Strategies... 4 The Psychology of Social Engineering (And

More information

82-10-43 Social Engineering and Reverse Social Engineering Ira S. Winkler Payoff

82-10-43 Social Engineering and Reverse Social Engineering Ira S. Winkler Payoff 82-10-43 Social Engineering and Reverse Social Engineering Ira S. Winkler Payoff Social engineering is the term that hackers use to describe attempts to obtain information about computer systems through

More information

WEB ATTACKS AND COUNTERMEASURES

WEB ATTACKS AND COUNTERMEASURES WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in

More information

Identity Theft Protection

Identity Theft Protection Identity Theft Protection Email Home EDUCATION on DANGER ZONES Internet Payments Telephone ID theft occurs when someone uses your personal information with out your knowledge to commit fraud. Some terms

More information

You Need To Comply With HIPAA And You Probably Don t Even Know It!

You Need To Comply With HIPAA And You Probably Don t Even Know It! You Need To Comply With HIPAA And You Probably Don t Even Know It! If a hospital or healthcare institution is one of your customers/clients, I hope you changed the way you approached the Health Insurance

More information

SECURITY CONSIDERATIONS FOR LAW FIRMS

SECURITY CONSIDERATIONS FOR LAW FIRMS SECURITY CONSIDERATIONS FOR LAW FIRMS Enterprise Risk Management Professional consulting firm that specializes in cyber security Founded in 1998 in Miami, Florida Serves more than 150 clients, locally,

More information

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent

More information

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,

More information

AUTHOR CONTACT DETAILS

AUTHOR CONTACT DETAILS AUTHOR CONTACT DETAILS Name Dinesh Shetty Profile Information Security Consultant Email ID dinesh.shetty@live.com Social Engineering Cyber security is an increasingly serious issue for the complete world

More information

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers. Employee Security Awareness Survey Trenton Bond trent.bond@gmail.com Admin - Version 1.3 Security Awareness One of the most significant security risks that organizations and corporations face today is

More information

CASE STUDY ON SOCIAL ENGINEERING TECHNIQUES FOR PERSUASION

CASE STUDY ON SOCIAL ENGINEERING TECHNIQUES FOR PERSUASION CASE STUDY ON SOCIAL ENGINEERING TECHNIQUES FOR PERSUASION Mosin Hasan 1, Nilesh Prajapati 2 and Safvan Vohara 3 1 Computer Department, BVM Engineering College, V V Nagar mosin83@yahoo.co.in 2IT Department,

More information

Are your people playing an effective role in your cyber resilience?

Are your people playing an effective role in your cyber resilience? Are your people playing an effective role in your cyber resilience? 01 Cyber attacks are now business as usual for organizations around the world. Organizations have typically trusted in technology to

More information

Title: Information Security: Preventing Identity Theft Code: 20327 Date: 1/5/2012 Screen:0

Title: Information Security: Preventing Identity Theft Code: 20327 Date: 1/5/2012 Screen:0 Title: Information Security: Preventing Identity Theft Code: 20327 Date: 1/5/2012 Screen:0 Revision Log: Overview: Who: When: Why: Sections: Welcome Pretest Tutorial Recap Job Aid Test Index Tutorial Sections:

More information

Learn to protect yourself from Identity Theft. First National Bank can help.

Learn to protect yourself from Identity Theft. First National Bank can help. Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone

More information

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,

More information

Creating a Culture of Cyber Security at Work

Creating a Culture of Cyber Security at Work Creating a Culture of Cyber Security at Work Webinar Why is this important? Cybersecurity is a people problem. Cybersecurity is no longer just the IT department s responsibility. It is everyone s responsibility.

More information

Practical tips for a. Safe Christmas

Practical tips for a. Safe Christmas Practical tips for a Safe Christmas CONTENTS 1. Online shopping 2 2. Online games 4 3. Instant messaging and mail 5 4. Practical tips for a safe digital Christmas 6 The Christmas holidays normally see

More information

Boston University Security Awareness. What you need to know to keep information safe and secure

Boston University Security Awareness. What you need to know to keep information safe and secure What you need to know to keep information safe and secure Introduction Welcome to Boston University s Security Awareness training. Depending on your reading speed, this presentation will take approximately

More information

Practical guide for secure Christmas shopping. Navid

Practical guide for secure Christmas shopping. Navid Practical guide for secure Christmas shopping Navid 1 CONTENTS 1. Introduction 3 2. Internet risks: Threats to secure transactions 3 3. What criteria should a secure e-commerce page meet?...4 4. What security

More information

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction

More information

Phishing Past, Present and Future

Phishing Past, Present and Future White Paper Phishing Past, Present and Future By Theodore Green, President, SpamStopsHere.com Abstract A particularly dangerous and now common type of spam known as "Phishing attempts to trick recipients

More information

2010 AICPA Top Technology Initiatives. About the Presenter. Agenda. Presenter: Dan Schroeder, CPA/CITP Habif, Arogeti, & Wynne, LLP

2010 AICPA Top Technology Initiatives. About the Presenter. Agenda. Presenter: Dan Schroeder, CPA/CITP Habif, Arogeti, & Wynne, LLP 2010 AICPA Top Technology Initiatives Presenter: Dan Schroeder, CPA/CITP Habif, Arogeti, & Wynne, LLP Georgia Society of CPAs Annual Convention June 16, 2010 About the Presenter Partner-in-Charge, Habif,

More information

Identity Protection Guide. The more you know, the better you can protect yourself.

Identity Protection Guide. The more you know, the better you can protect yourself. Identity Protection Guide The more you know, the better you can protect yourself. Be Aware According to a 2012 report, identity theft is one of the fastest growing crimes in America 1 and it can have serious

More information

Avoid completing forms in email messages that ask for personal financial information.

Avoid completing forms in email messages that ask for personal financial information. INTERNET FRAUD Online scams and viruses are constantly evolving and they threaten the security of computers worldwide. As criminals evolve their tactics, you need to keep your PC's security software (virus

More information

Identity Theft Awareness: Don t Fall Victim to these Common Scams

Identity Theft Awareness: Don t Fall Victim to these Common Scams Identity Theft Awareness: Don t Fall Victim to these Common Scams We want you to understand what identity theft is, how it happens, and how to protect yourself. Please read and familiarize yourself with

More information

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C. Belmont Savings Bank Are there Hackers at the gate? 2013 Wolf & Company, P.C. MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf & Company, P.C. About Wolf & Company, P.C.

More information

Protecting Yourself from Identity Theft

Protecting Yourself from Identity Theft Protecting Yourself from Identity Theft Identity theft is everywhere. In fact, according to a 2013 report by Javelin Research, there is one incident of identity fraud every two seconds. While we cannot

More information

TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY. Mark Villinski @markvillinski

TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY. Mark Villinski @markvillinski TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY Mark Villinski @markvillinski Why do we have to educate employees about cybersecurity? 2014 Corporate Threats Survey 94% of business s suffered one

More information

Phishing Scams Security Update Best Practices for General User

Phishing Scams Security Update Best Practices for General User Phishing Scams Security Update Best Practices for General User hishing refers to the malicious attack Pmethod by attackers who imitate legitimate companies in sending emails in order to entice people to

More information

IBM Global Technology Services May 2007. The vishing guide. Gunter Ollmann

IBM Global Technology Services May 2007. The vishing guide. Gunter Ollmann IBM Global Technology Services May 2007 The vishing guide. Gunter Ollmann Page 2 Contents 2 Executice summary 3 What is vishing? 5 Attack vectors 6 Initiating the attack 15 Conclusions Executive summary

More information

DON T BE FOOLED BY EMAIL SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam E-Mail FREE GUIDE. December 2014 Oliver James Enterprise

DON T BE FOOLED BY EMAIL SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam E-Mail FREE GUIDE. December 2014 Oliver James Enterprise Provided by: December 2014 Oliver James Enterprise DON T BE FOOLED BY EMAIL SPAM FREE GUIDE 1 This guide will teach you: How to spot fraudulent and spam e-mails How spammers obtain your email address How

More information

Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May 2014. TrustInAds.org. Keeping people safe from bad online ads

Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May 2014. TrustInAds.org. Keeping people safe from bad online ads Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams May 2014 TrustInAds.org Keeping people safe from bad online ads OVERVIEW Today, even the most tech savvy individuals can find themselves

More information

SOCIAL ENGINEERING AWARENESS. Part of the Information Security Awareness Series

SOCIAL ENGINEERING AWARENESS. Part of the Information Security Awareness Series SOCIAL ENGINEERING AWARENESS Part of the Information Security Awareness Series Today You ll Learn: 1. Overview of common attack vectors 2. What Social Engineering is 3. The different kinds of Social Engineering

More information

Achieving Compliance with the PCI Data Security Standard

Achieving Compliance with the PCI Data Security Standard Achieving Compliance with the PCI Data Security Standard June 2006 By Alex Woda, MBA, CISA, QDSP, QPASP This article describes the history of the Payment Card Industry (PCI) data security standards (DSS),

More information

Retail/Consumer Client. Internet Banking Awareness and Education Program

Retail/Consumer Client. Internet Banking Awareness and Education Program Retail/Consumer Client Internet Banking Awareness and Education Program Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 E-mail Risk... 3 Internet

More information

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft

More information

+GAMES. Information Security Advisor. Be a Human Firewall! The Human Firewall' s Top Concerns in the Cyber, People & Physical Domains

+GAMES. Information Security Advisor. Be a Human Firewall! The Human Firewall' s Top Concerns in the Cyber, People & Physical Domains Information Security Advisor December 2015 Be a Human Firewall! The Human Firewall' s Top Concerns in the Cyber, People & Physical Domains +GAMES Spot the insider & Human firewall Filtering EXerCISE Good

More information

PBX Fraud Educational Information for PBX Customers

PBX Fraud Educational Information for PBX Customers PBX Fraud Educational Information for PBX Customers Telephone Hackers Hit Where It Hurts: Your Wallet Telephone hacking is unauthorized or fraudulent activities that can affect your telephone system, and

More information

Common Cyber Threats. Common cyber threats include:

Common Cyber Threats. Common cyber threats include: Common Cyber Threats: and Common Cyber Threats... 2 Phishing and Spear Phishing... 3... 3... 4 Malicious Code... 5... 5... 5 Weak and Default Passwords... 6... 6... 6 Unpatched or Outdated Software Vulnerabilities...

More information

CUSTOMER SECURITY AWARENESS: A Key Defense Against Corporate Account Takeover & Cyber Fraud

CUSTOMER SECURITY AWARENESS: A Key Defense Against Corporate Account Takeover & Cyber Fraud CUSTOMER SECURITY AWARENESS: A Key Defense Against Corporate Account Takeover & Cyber Fraud Presented by Tom Garcia President / CEO InfoSight, Inc. 2014 InfoSight What we ll cover today 1. The MFA & NACHA

More information

FINANCIAL CRIMES. Lesson Plan and Course Outline. INSTRUCTOR EQUIPMENT/MATERIALS PowerPoint, LCD Projector, Computer, and Handouts

FINANCIAL CRIMES. Lesson Plan and Course Outline. INSTRUCTOR EQUIPMENT/MATERIALS PowerPoint, LCD Projector, Computer, and Handouts FINANCIAL CRIMES Lesson Plan and Course Outline Instructor Detective Kelly Smith Method of Presentation Lecture Duration 8 Hours Trainee Equipment/Materials Note taking material INSTRUCTOR EQUIPMENT/MATERIALS

More information

Streamlining Web and Email Security

Streamlining Web and Email Security How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor

More information

Fraud Prevention Tips

Fraud Prevention Tips Fraud Prevention Tips The best defense against fraud or identity theft is a proactive approach. Here are a few steps you can take to help protect yourself. Protect your identity Copy the front and back

More information

Technical Testing. Network Testing DATA SHEET

Technical Testing. Network Testing DATA SHEET DATA SHEET Technical Testing Network Testing The Dell SecureWorks Technical Testing services deliver the independent expertise, experience and perspective you need to enhance your security posture, reduce

More information

How to stay safe online

How to stay safe online How to stay safe online Everyone knows about computer viruses...or at least they think they do. Nearly 30 years ago, the first computer virus was written and since then, millions of viruses and other malware

More information

THE STATE BAR OF TEXAS. Just Hang UP. Protect Yourself From Unscrupulous Telemarketers and Con Artists

THE STATE BAR OF TEXAS. Just Hang UP. Protect Yourself From Unscrupulous Telemarketers and Con Artists THE STATE BAR OF TEXAS Just Hang UP Protect Yourself From Unscrupulous Telemarketers and Con Artists JUST HANG UP! Protect Yourself From Unscrupulous Telemarketers and Con Artists I'm Barbara Bush for

More information

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

When you listen to the news, you hear about many different forms of computer infection(s). The most common are: Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than ever. Thanks to the Internet, you can conduct your banking,

More information

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange The responsibility of safeguarding your personal information starts with you. Your information is critical and it must be protected from unauthorised disclosure, modification or destruction. Here we are

More information

Desktop and Laptop Security Policy

Desktop and Laptop Security Policy Desktop and Laptop Security Policy Appendix A Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious

More information

Put into test the security of an environment and qualify its resistance to a certain level of attack.

Put into test the security of an environment and qualify its resistance to a certain level of attack. Penetration Testing: Comprehensively Assessing Risk What is a penetration test? Penetration testing is a time-constrained and authorized attempt to breach the architecture of a system using attacker techniques.

More information

Cyber Security. Securing Your Mobile and Online Banking Transactions

Cyber Security. Securing Your Mobile and Online Banking Transactions Cyber Security Securing Your Mobile and Online Banking Transactions For additional copies or to download this document, please visit: http://msisac.cisecurity.org/resources/guides 2014 Center for Internet

More information

Practical Threat Intelligence. with Bromium LAVA

Practical Threat Intelligence. with Bromium LAVA Practical Threat Intelligence with Bromium LAVA Practical Threat Intelligence Executive Summary Threat intelligence today is costly and time consuming and does not always result in a reduction of successful

More information

Keeping watch over your best business interests.

Keeping watch over your best business interests. Keeping watch over your best business interests. 0101010 1010101 0101010 1010101 IT Security Services Regulatory Compliance Services IT Audit Services Forensic Services Risk Management Services Attestation

More information

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks White paper Phishing, Vishing and Smishing: Old Threats Present New Risks How much do you really know about phishing, vishing and smishing? Phishing, vishing, and smishing are not new threats. They have

More information

BE SAFE ONLINE: Lesson Plan

BE SAFE ONLINE: Lesson Plan BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take

More information

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER WHITE PAPER CHALLENGES Protecting company systems and data from costly hacker intrusions Finding tools and training to affordably and effectively enhance IT security Building More Secure Companies (and

More information

Welcome to Information Security Training

Welcome to Information Security Training Welcome to Information Security Training Welcome to Georgia Perimeter College s Information Security Training. Information security consists of processes, measures, and technologies employed to protect

More information

How to build and use a Honeypot. Ralph Edward Sutton, Jr. DTEC 6873 Section 01

How to build and use a Honeypot. Ralph Edward Sutton, Jr. DTEC 6873 Section 01 How to build and use a Honeypot By Ralph Edward Sutton, Jr DTEC 6873 Section 01 Abstract Everybody has gotten hacked one way or another when dealing with computers. When I ran across the idea of a honeypot

More information

Recurrent Patterns Detection Technology. White Paper

Recurrent Patterns Detection Technology. White Paper SeCure your Network Recurrent Patterns Detection Technology White Paper January, 2007 Powered by RPD Technology Network Based Protection against Email-Borne Threats Spam, Phishing and email-borne Malware

More information

NACS/PCATS WeCare Data Security Program Overview

NACS/PCATS WeCare Data Security Program Overview NACS/PCATS WeCare Data Security Program Overview March 27, 2012 Abstract This document describes the WeCare Program, discusses common data security threats, outlines an 8-point plan to improve data security,

More information

INSIDE. Malicious Threats of Peer-to-Peer Networking

INSIDE. Malicious Threats of Peer-to-Peer Networking Symantec Security Response WHITE PAPER Malicious Threats of Peer-to-Peer Networking by Eric Chien, Symantec Security Response INSIDE Background Protocols New Vector of Delivery Malicious Uses of Peer-to-Peer

More information

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and

More information

NATIONAL CYBER SECURITY AWARENESS MONTH

NATIONAL CYBER SECURITY AWARENESS MONTH NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the

More information

Defensive Training for Social Engineering

Defensive Training for Social Engineering FISSEA 2009 22nd Annual Conference Defensive Training for Social Engineering Stacey Banks, CISSP, CCO, CSM Background Oxford Federal, LLC Information security solutions and services company providing certification

More information

Payment Systems Department

Payment Systems Department v Note: Please follow these guidelines for your safety as you enjoy the convenience of technology. However these guidelines are general; therefore, specific precautions may be taken as warranted by the

More information

OIG Fraud Alert Phishing

OIG Fraud Alert Phishing U.S. EQUAL EMPLOYMENT OPPORTUNITY COMMISSION Washington, D.C. 20507 Office of Inspector General Aletha L. Brown Inspector General July 22, 2005 OIG Fraud Alert Phishing What is Phishing? Phishing is a

More information

Achieving Information Security

Achieving Information Security Achieving Information Security Beyond penetration testing and frameworks ISACA Athens Conference 25 November, 2014. All good information security presentations start with a Bruce Schneier quote - Not Bruce

More information

HIPAA Training Part III. Health Insurance Portability and Accountability Act

HIPAA Training Part III. Health Insurance Portability and Accountability Act HIPAA Training Part III Health Insurance Portability and Accountability Act POLICIES & PROCEDURES Goals Learn simple ways to protect information. Learn how to continually give training. Learn how to continually

More information

Top Five Ways to Protect Your Network. A MainNerve Whitepaper

Top Five Ways to Protect Your Network. A MainNerve Whitepaper A MainNerve Whitepaper Overview The data security challenges within the business world have never been as challenging as they are today. Not only must organizations providers comply with stringent State

More information

Technical Testing. Application, Network and Red Team Testing DATA SHEET. Test your security defenses. Expert Testing, Analysis and Assessments

Technical Testing. Application, Network and Red Team Testing DATA SHEET. Test your security defenses. Expert Testing, Analysis and Assessments DATA SHEET Technical Testing Application, Network and Red Team Testing The Dell SecureWorks Technical Testing services deliver the independent expertise, experience and perspective you need to enhance

More information

How to Justify Your Security Assessment Budget

How to Justify Your Security Assessment Budget 2BWhite Paper How to Justify Your Security Assessment Budget Building a Business Case For Penetration Testing WHITE PAPER Introduction Penetration testing has been established as a standard security practice

More information

SECTION: SUBJECT: PCI-DSS General Guidelines and Procedures

SECTION: SUBJECT: PCI-DSS General Guidelines and Procedures 1. Introduction 1.1. Purpose and Background 1.2. Central Coordinator Contact 1.3. Payment Card Industry Data Security Standards (PCI-DSS) High Level Overview 2. PCI-DSS Guidelines - Division of Responsibilities

More information

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA Emerging Network Security Threats and what they mean for internal auditors December 11, 2013 John Gagne, CISSP, CISA 0 Objectives Emerging Risks Distributed Denial of Service (DDoS) Attacks Social Engineering

More information

IDENTITY THEFT WHAT YOU NEED TO KNOW. Created by GL 04/09

IDENTITY THEFT WHAT YOU NEED TO KNOW. Created by GL 04/09 IDENTITY THEFT WHAT YOU NEED TO KNOW Created by GL 04/09 Table of Contents 1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do

More information

Recommended Practice Case Study: Cross-Site Scripting. February 2007

Recommended Practice Case Study: Cross-Site Scripting. February 2007 Recommended Practice Case Study: Cross-Site Scripting February 2007 iii ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber

More information

Information Security Training. Jason Belford Jimmy Lummis

Information Security Training. Jason Belford Jimmy Lummis Information Security Training Jason Belford Jimmy Lummis Presenters Who are these guys? Jason Belford Principal Information Security Engineer Jimmy Lummis Information Security Policy and Compliance Manager

More information

ENDPOINT SECURITY WHITE PAPER. Endpoint Security and Advanced Persistent Threats WWW.COMODO.COM

ENDPOINT SECURITY WHITE PAPER. Endpoint Security and Advanced Persistent Threats WWW.COMODO.COM WHITE PAPER Endpoint Security and Advanced Persistent Threats The Invisible Threat They re out there waiting. Sitting at their computers hoping for you to make a mistake. And you will. Because no one is

More information

E-BUSINESS THREATS AND SOLUTIONS

E-BUSINESS THREATS AND SOLUTIONS E-BUSINESS THREATS AND SOLUTIONS E-BUSINESS THREATS AND SOLUTIONS E-business has forever revolutionized the way business is done. Retail has now a long way from the days of physical transactions that were

More information

PENETRATION TESTING GUIDE. www.tbgsecurity.com 1

PENETRATION TESTING GUIDE. www.tbgsecurity.com 1 PENETRATION TESTING GUIDE www.tbgsecurity.com 1 Table of Contents What is a... 3 What is the difference between Ethical Hacking and other types of hackers and testing I ve heard about?... 3 How does a

More information

Student Tech Security Training. ITS Security Office

Student Tech Security Training. ITS Security Office Student Tech Security Training ITS Security Office ITS Security Office Total Security is an illusion security will always be slightly broken. Find strategies for living with it. Monitor our Network with

More information

Customer Awareness for Security and Fraud Prevention

Customer Awareness for Security and Fraud Prevention Customer Awareness for Security and Fraud Prevention Identity theft continues to be a growing problem in our society today. All consumers must manage their personal information wisely and cautiously to

More information

What Do You Mean My Cloud Data Isn t Secure?

What Do You Mean My Cloud Data Isn t Secure? Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there

More information

Infocomm Sec rity is incomplete without U Be aware,

Infocomm Sec rity is incomplete without U Be aware, Infocomm Sec rity is incomplete without U Be aware, responsible secure! HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD [ 2 ] FASTEN

More information

Conducting an Email Phishing Campaign

Conducting an Email Phishing Campaign Conducting an Email Phishing Campaign WMISACA/Lansing IIA Joint Seminar May 26, 2016 William J. Papanikolas, CISA, CFSA Sparrow Health System Estimated cost of cybercrime to the world economy in 2015 was

More information

Top 10 Tips to Keep Your Small Business Safe

Top 10 Tips to Keep Your Small Business Safe Securing Your Web World Top 10 Tips to Keep Your Small Business Safe Protecting your business against the latest Web threats has become an incredibly complicated task. The consequences of external attacks,

More information

The Weakest Link: Mitigating Web Application Vulnerabilities. webscurity White Paper. webscurity Inc. Minneapolis, Minnesota USA

The Weakest Link: Mitigating Web Application Vulnerabilities. webscurity White Paper. webscurity Inc. Minneapolis, Minnesota USA The Weakest Link: Mitigating Web Application Vulnerabilities webscurity White Paper webscurity Inc. Minneapolis, Minnesota USA January 25, 2007 Contents Executive Summary...3 Introduction...4 Target Audience...4

More information

Countermeasures against Spyware

Countermeasures against Spyware (2) Countermeasures against Spyware Are you sure your computer is not infected with Spyware? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Spyware?

More information

Austin Peay State University

Austin Peay State University 1 Austin Peay State University Identity Theft Operating Standards (APSUITOS) I. PROGRAM ADOPTION Austin Peay State University establishes Identity Theft Operating Standards pursuant to the Federal Trade

More information

white paper Malware Security and the Bottom Line

white paper Malware Security and the Bottom Line Malware Security Report: Protecting Your BusineSS, Customers, and the Bottom Line Contents 1 Malware is crawling onto web sites everywhere 1 What is Malware? 2 The anatomy of Malware attacks 3 The Malware

More information

:: Free but Fake: Rogue Anti-malware. Cristian Borghello, CISSP

:: Free but Fake: Rogue Anti-malware. Cristian Borghello, CISSP :: Free but Fake: Rogue Anti-malware Cristian Borghello, CISSP Table of Contents Introduction 2 Analysis of a Well-known Case 3 Conclusion 7 Further Information 8 1 Introduction Most antivirus products

More information

Statistical Analysis of Internet Security Threats. Daniel G. James

Statistical Analysis of Internet Security Threats. Daniel G. James Statistical Analysis of Internet Security Threats Daniel G. James ABSTRACT The purpose of this paper is to analyze the statistics surrounding the most common security threats faced by Internet users. There

More information

E-Banking Regulatory Update

E-Banking Regulatory Update E-Banking Regulatory Update Hal R. Paretchan, CISA, CISSP, CFE Information Technology Specialist Federal Reserve Bank of Boston Supervision, Regulation & Credit (617) 973-5971 hal.paretchan@bos.frb.org

More information

2012 Data Breach Investigations Report

2012 Data Breach Investigations Report 2012 Data Breach Investigations Report A study conducted by the Verizon RISK Team with cooperation from the Australian Federal Police, Dutch National High Tech Crime Unit, Irish Reporting & Information

More information