Social Engineering
Social Engineering
Updated: 03/12/2022 by Computer Hope
Tip
Security measures
Most of the social engineering attacks are over the phone, e-mail, or
other forms of communication that do not require face to face
communication. If you cannot see whom you are talking to, assume
the person you're talking to may not be who they say they are.
Not all social engineering attacks happen over the phone or the
Internet. An attacker could also visit the company with a pretend
badge or form of identification. Every business should have a front
desk or security guard who is also aware of all security threats and
knows no one can pass without proper authorization. They should also
realize that if these precautions are ignored (e.g., someone says they
forgot their badge) that it would result in them losing their job.
It's also a good idea to have more sensitive areas, like a server room,
require additional security, like a badge reader, that only allows
authorized employees to access the room. Also, employees that access
a building or room using a badge should realize they too should not
allow anyone to come through the door at the same time as them.
Shred
Some people are not afraid to dumpster dive to find confidential
company information or other information that would allow them
access to a network. Any papers your employees throw away should
be shredded.