Posts

Showing posts from August, 2018

The missing link in corporate IT security

Image
Corporate IT security has never been more important, yet evens the most sophisticated software defences can’t protect against human error. It should come as no surprise, therefore, that attackers increasingly rely on spear-phishing and other  social engineering   approaches to break into corporate IT systems. In particular, when it comes to hacking executives and other high-value targets, it pays for cyber-criminals to mount sophisticated, highly personalized attacks against their marks. Security-focused user training has arisen as a partial solution to this problem, but it has its limitations: compliance is never perfect, and any good social engineer will always be a step ahead of the curve. This is why companies should also focus on making social engineering more difficult to pull off. How? By obscuring sources of personal information that can be used to customize attacks. This security-focused scrubbing process is key to our privacy solutions here at  SingaDBS . The rise

How social engineers find your personal information

Image
Social engineering is one of the fastest growing types of cyber-crime, since it leverages human error to get past even the most robust security systems. It’s also highly adaptable:  from Edward Snowden’s NSA leaks to executive wire fraud, from corporate espionage to ransom are attacks; social engineering has been a part of many of the biggest data breaches in recent years. So what is the key ingredient to a successful social engineering attack? Personal information. In order for the ploy to be successful, the attacker needs to tell a plausible story that feels authentic and wins over your trust. To do that, the attacker collects personal information that validates his or her story. Below, we’ll go over some of primary ways that social engineers find the personal information used in their attacks, and then provide tips on how to protect yourself. Corporate websites and PR : Executives are among the most common targets of personalized social engineering attacks, be

6 ways to executive social engineering

Image
Executives make for tantalizing hacking targets, since a successful infiltration of their accounts can lead to a huge payoff—whether financial, or in terms of information gathering, or both. Executives often have access to many data systems, and many demand exceptions to company security regulations from their IT departments when they perceive them as too burdensome. It is easy to see, therefore, why attackers are increasingly focusing on  social engineering techniques  that involve tricking a company executive into granting system access. Below, we’ll take a look at some of the most common social engineering ploys used to compromise executives, as well as what you can do to prevent them. Executive impersonation : Since executives often travel for work, knowledge of their travel plans makes it easy to impersonate them. No one, after all, would be suspicious of an email request from the CEO when everyone in the office knows that he or she is presenting at a conference. O

Social Engineering

Image
Social engineering is a threat vector that depends heavily on human interaction and infrequently involves manipulating individuals into breaking traditional security procedures and best practices so as to achieve access to systems, networks or physical locations, or for gain. Fraudulent actors use  social engineering techniques  to hide their true identities and motives and gain themselves as a trusty individual or info supply. The target is to influence, manipulate or trick users into leaving behind privileged info or access among a company. Several social engineering exploits merely have confidence people’s temperament to be useful. For instance, the offender may fake to be a fellow worker who has some reasonably imperative drawback that needs access to further network resources. Social engineering is a common tactic among hackers because it is often easier to exploit users’ weaknesses than it is to find a network or software vulnerability.  Hackers will often use social engi

How to respond negative reviews

Image
Introduction: As marvelous as it would be to easily build all negative customer feedback disappear, review management could be a bit trickier. Most sites have strict policies in place around review removal. The majority of cases, reviews will solely be removed if they violate specific terms and conditions, and also the removal will only be done by the review website itself. Requesting review removal tends to be a protracted, lengthy method and you aren’t sure to get your approach. So how can you make sure negative reviews don’t damage your business? If the negative reviewer is a real consumer, it may be much more effective to interact in a dialogue and check out to resolve the problem one-on-one. a lot of typically than not, a dissatisfied consumer spews rants on review sites just to excuse steam. Acknowledging the customer’s issues may facilitate quiet down the trend and perhaps even win loyalty back. Who knows? The customer could even be inclined to update or perhaps delet

4 tips to optimizing your LinkedIn business page

Image
When was the last time you evaluated your company LinkedIn page? Does it represent your brand well, attract prospective clients and showcase your business as an authority in its field? Many small businesses take the necessary steps to create a company LinkedIn page, but aren’t quite sure if their page is doing all it should. Here are some advanced tips to make sure your business page is the best it can be. 1. Create Showcase Pages : A Showcase Page is an offshoot of your company profile page that enables you to promote a specific product or service that your business offers. And because Showcase Pages have analytics, you’ll be able to track visitor interest in those products or services. Let’s say you sell digital cameras. You can set up a Showcase Page that highlights your best-selling camera. Or, if you run a pet shop, you could highlight your pet grooming services. On your LinkedIn company page, Showcase Pages are below the About Us section. Look at the Adobe page below