Lots of people these days are talking about cybersecurity. To many people, this conjures images of hackers delving deep into computer code to unearth and exploit systematic weaknesses. The reality is that many of the most successful cyberscams rely not on the weaknesses within a computer system but on the weaknesses of human beings. For example, the John Podesta email hack was a social engineered spear phishing attack.
Known as social engineering attacks, these scams use a number of methods to trick company employees into granting the hacker access to a network, giving up proprietary information, or even occasionally taking action against a company’s interest. In 2015, these attacks became the most popular way hackers chose to try and exploit company systems. READ MORE: Social Engineering 101, An Introduction
Companies who want to stay ahead of the game on cybersecurity need to do more than secure their IT systems from mechanical exploits. They also need to protect against weaknesses that arise from the human element in those systems.
There are a number of steps companies can take to mitigate these attacks:
The more employees know about popular forms of attack, the more likely they are to spot an attack as its happening and therefore, the less likely they are to fall for them.
Employees need procedures to fall back on when faced with the pressure that can come from some of these attacks. For example, a popular method of attack involves posing as an external auditor asking questions about data security or similar issues. An employee trained to verify all such requests with a manager before giving out certain information is far less likely to cause a security breach when faced with this type of attack.
Companies need to keep both themselves and their employees up to date as the cybersecurity landscape changes and perform regular checks to ensure their policies are effective and being followed.