Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Would Your Users Fall For These Social Engineering Schemes?

Would Your Users Fall For These Social Engineering Schemes?

Social engineering is one of the trickiest parts of protecting your organization. It might sound like something out of a science fiction flick, but it’s one of the most dangerous attacks that a hacker can use against your business. Social engineering attempts to manipulate the target into giving away sensitive credentials or personal information for the purpose of stealing identities and other malicious intentions.

Here are some of the most popular social engineering hacks that you’ll have to watch out for in the business world.

  • Vishing: More people are aware of phishing attacks than ever before, so naturally hackers had to pick up the slack somehow. Vishing is the alternative option that they are now trying to use, which features a voicemail asking for personal information.
  • HTTPS: SSL certificates can make sure that users are aware of whether or not a website is secure enough to protect your personal information. However, HTTPS doesn’t necessarily mean that a website is using security. Hackers can lure in victims by providing “free” SSL certificates to organizations, providing them with a false sense of security. You need to find proof that the website using SSL has an extended validation (EV-SSL), which is not offered for free at all. You’ll see a green bar in the URL bar when this type of encryption is available.
  • Website Copycats: Some scammers have even gone so far as to make websites that look exactly like reputable sites that are designed to harvest credentials or infect computers with malware. One example of this is the Equifax data loss incident which occurred in June 2017. Equifax had set up a website to help clients who had their information stolen, which used the URL However, hackers capitalized on this event and created a spoof website using the domain The result tricked Equifax themselves. Here are some tips to help you avoid these spoofed websites:
    • Make sure the URL is correct
    • Don’t give information to sites that aren’t using EV-SSL
    • Look for seals of trust from reputable IT security websites
    • Be on the lookout for spelling errors, typos, or broken English
  • Every Word Password Theft: Hacking tools have certainly developed into more sophisticated threats, going so far as to utilize every single word in the dictionary to crack passwords. These password crackers can create hundreds of thousands of credentials in a matter of minutes, all using a dictionary attack against unwary users. Therefore, the best approach to creating strong passwords is to use numbers, letters, and symbols to make a mixture that nobody would expect.

Online threats can be a considerable problem for your organization, especially when they use each and every exploit against you. Thankfully, with some proactive measures that can keep your business safe, you’ll have a much easier time going about your online duties without exposing your data to threats. To learn more about how to protect your business, reach out to us at (703) 821-8200.

Tip of the Week: Gmail Is Made Even Easier When Yo...
Managed IT Services Bring Substantial Value


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, 21 March 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Software Business Computing Hackers Backup Managed Service Provider Productivity Workplace Tips Data Hardware Saving Money Business Malware Email IT Support IT Services Hosted Solutions Google Small Business Efficiency Quick Tips Smartphones Network Security Gadgets User Tips Mobile Devices Business Continuity Disaster Recovery Computer Mobile Office Network Virtualization Microsoft Office Server VoIP Mobile Device Management Social Media Windows 10 Miscellaneous Upgrade Unified Threat Management Ransomware Windows Smartphone Innovation Android Remote Monitoring Passwords Holiday Operating System Remote Computing WiFi Vendor Management Mobile Computing BYOD Communication Apps Marketing Collaboration Facebook The Internet of Things Analytics Cybersecurity Firewall History Managed IT services Users IT Support Apple Data Management Alert Save Money communications Managed IT Services Productivity Outsourced IT IT Consultant Phishing Health Internet of Things Bring Your Own Device Big data Office App Automation Gmail Content Filtering BDR Wireless Technology Search Outlook Budget Maintenance Lithium-ion Battery Virus Hard Drives Data Recovery Managed IT Antivirus Windows 8 Hiring/Firing Artificial Intelligence Tech Support Information Technology Best Practice Going Green Spam Browser Data Backup Employer-Employee Relationship Mobile Device Bandwidth Cost Management Encryption Update Phone System Help Desk Hacking Office 365 Money Printer Recovery IBM Document Management Cybercrime SaaS Risk Management Saving Time It Management Intranet Hard Drive Two-factor Authentication Customer Service Networking Administration Website Travel Education Proactive IT Law Enforcement Computers Save Time VPN Data storage Cloud Computing Running Cable Humor Legal Government Hosted Solution Word Computer Repair Robot Current Events Cortana Password Excel Social Engineering Hacker Downtime Black Market Tablet Mobility Company Culture Business Growth Windows 10 Wireless Telephone Systems Digital Payment Training Disaster Comparison End of Support Augmented Reality PowerPoint Securty Social Networking Data Security Solid State Drive Twitter Flexibility Fax Server User Laptop iPhone Business Intelligence DDoS Project Management Avoiding Downtime Computing Distributed Denial of Service Identity Theft Trending Pain Points Public Cloud IT service User Error Virtual Reality Statistics Compliance Processors Business Technology USB Computing Infrastructure Streaming Media Presentation Gaming Console Scam Automobile Inbound Marketing Virtual Desktop Webcam Telephony Monitors Programming Chrome How To Documents Heating/Cooling Digital Vulnerabilities Router Mobile Technology YouTube Websites Start Menu Settings Computer Accessories Unified Communications Customer Relationship Management Taxes Retail Software as a Service Access Control Uninterrupted Power Supply Bitcoin Experience Mouse eWaste Value Co-managed IT Politics Text Messaging Data Protection Blockchain Google Maps Patch Management Data Loss Lifestyle Cryptocurrency Google Docs Safety Specifications Redundancy Data Breach Net Neutrality Hack Social Office Tips Private Cloud Network Congestion Paperless Office Sports Worker Relocation Machine Learning Windows Server 2008 Video Surveillance Emergency Analytic Saving ZTime Computer Care LinkedIn Unified Threat Management Notifications Public Speaking Google Drive Employer Employee Relationship Applications Licensing Reliable Computing Archive Windows 7 Debate Vulnerability Music Printing Electricity Botnet Fiber-Optic Entrepreneur Mobile Security Point of Contact Upgrades HIPAA Upselling Business Managemenet Webinar Freedom of Information Bluetooth Electronic Payment LiFi Thin CLient Downloads WannaCry Computer Malfunction Fraud UTM Rental Service IP Address Deep Learning Time Management News Human Resources Memory Visible Light Communication Leadership Google Calendar Best Practives Motion Sickness email scam Wi-Fi Tracking Multi-factor Authentication Touchscreen Skype Knowledge Microserver Fake News Flash Device Management Advertising Google Wallet Technology Tips Teamwork Web Server Workers Device security Displays Storage Tech Terms Turn Key online Currency Microsoft Excel PDF Keyboard Drones Best Available Access Trojan Business Cards Banking Organize Samsung Tech Term File Sharing Mobile Payment Domains Product Reviews Read G Suite Language Permissions Shortcut Spyware Physical Security Piracy Business Metrics Tablets HTML Television Writing Troubleshooting switches GPS Sync Staffing Environment Competition cache CCTV Software License Chromebook Messenger SharePoint Ebay Business Owner 3D Corporate Profile In Internet of Things Tip of the week Work/Life Balance Recycling Application Harddrive Assessment Emails IT Plan Download Books Scalability Evernote Pirating Information IT consulting Adminstration External Harddrive VoIP Virtual Assistant Cleaning Digital Signature CIO Consultation Meetings Migration Microchip Cabling Reading Content Management Data Warehousing Regulations Entertainment Windows XP Audit Smart Phones Get More Done Administrator Hard Drive Disposal Society Hacks Micrsooft Printer Server Supercomputer Desktop Productuvuty CrashOverride Devices 3D Printing Capital