• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
Menu
  • Home
  • About Us
  • Solutions & Services
    • Security Governance
    • NETWORK SECURITY
    • CLOUD SECURITY
  • COMPLIANCE
  • SECTORS
  • Blog
  • CONTACT

All about social engineering

By kamran | At September 4, 2019

Sep 04 2019

All about social engineering

Social engineering is an art of gaining access to buildings, systems and data without breaking in and using hacking techniques but trough exploiting human psychology.

The hacker will call an employee in an organization and pose as an IT expert instead of searching for software vulnerability. The hackers will try to trick the employees into exposing sensitive data, including password.

The techniques of social engineering become more popular in the 90s, whereas the ideas and techniques have been in the market for a long time.

A social engineer can make his ways to your data and system instead of having all the possible security measures, policies and practical measures like having reliable security for your cloud, building’s physical security, having defensive technology and much more.

Social engineering techniques

Social engineering is a successful way for a cybercriminal to gain access to an organization system and data. The social engineer will track and get the password of a trusted employee, which he further uses to log in and snoop around for sensitive data. The cyber-criminal can also use access code or card to enter a facility to steal assets, and sensitive data.

The social engineers also use emails to get access to sensitive data. They will send emails to the co-worker, and it will say that it is from another co-worker and people trust it as it appears to b from a trusted person. Most of the employees will link on the links and open the body as they are unaware of the social engineering.

Social engineering examples

The social engineers take weeks and months to gather information before attacking. They usually search for a company phone list, organization chart, employees on social media like Facebook, Twitter, and LinkedIn etc.

On the phone

Social engineers use phone calls to gather information as they pretend to be a co-worker or fellow employee. An organization should train their employees not to share sensitive information over the phone.

Online

The social engineer uses social networking sites to collect information about a firm. Facebook, LinkedIn and other sites carry enough information that an attacker can use to gain access to a system. They use online scams, phishing emails and other ways to gain access. They also take advantage of breaking news events, holidays, pop culture, and other devices to lure victims.

Written by kamran · Categorized: Cyber security threats

Primary Sidebar

Recents post

Your Law Firm Could Be Next — Are You Protected?

Cybercriminals are targeting … [Read More...] about Your Law Firm Could Be Next — Are You Protected?

Litigation, Logins, Breach Response & More: A Lawyer’s Cyber Survival Guide

Your clients trust you with … [Read More...] about Litigation, Logins, Breach Response & More: A Lawyer’s Cyber Survival Guide

Massive Surge in Healthcare Cyber Attacks…Ransomware, Radiology Data Breach, and More

The first half of 2025 has … [Read More...] about Massive Surge in Healthcare Cyber Attacks…Ransomware, Radiology Data Breach, and More

Categories

  • AI and cybersecurity (2)
  • blockchain (1)
  • Cloud security (29)
  • Compliance (25)
  • Cyber security news (108)
  • Cyber security threats (376)
  • Cyber security tips (370)
  • Data Security (3)
  • E-Commerce cyber security (3)
  • Education cyber security (1)
  • Enterprise cyber security (7)
  • Financial organizations cyber security (4)
  • General (22)
  • Government cyber security (4)
  • Healthcare cyber security (19)
  • Information Security (2)
  • Law Firms Cyber Security (9)
  • Network security (9)
  • Newsletter (1)
  • Privacy (1)
  • Ransomware (14)
  • remote work (1)
  • Risk assessment and management (6)
  • Security management and governance (9)
  • SME Cybersecurity (2)
  • Software Security (2)
  • Supply Chain Attacks (5)
  • System security (3)
  • Uncategorized (35)
  • Vendor security (14)

Archives

Footer

Infoguard Cyber Security

San Jose Office
333 W. Santa Clara Street
Suite 920
San Jose, CA 95113
Ph: (855) 444-6004

Irvine Office
19800 MacArthur Blvd.
Suite 300
Irvine, CA 92612

Recent Posts

  • Your Law Firm Could Be Next — Are You Protected?
  • Litigation, Logins, Breach Response & More: A Lawyer’s Cyber Survival Guide
  • Massive Surge in Healthcare Cyber Attacks…Ransomware, Radiology Data Breach, and More

Get Social

  • LinkedIn
© 2025 Cyber Security Solutions, Compliance, and Consulting Services - IT Security. All Rights Reserved.
Linkedin-in
Menu
  • Home
  • ABOUT US
  • Blog
  • Compliance Services
  • CONTACT
  • Sectors
Menu
  • Home
  • ABOUT US
  • Blog
  • Compliance Services
  • CONTACT
  • Sectors
  • Privacy Policy
  • Terms of Use
  • Acceptable Use