We've moved! Visit
The Keyword
for small business news, stories and resources.
Small Business
Tips and tricks for managing your business with Google’s solutions
Protect your business by understanding common social engineering techniques
Tuesday, April 3, 2012
Social engineering
is the manipulation of the natural human tendency to trust. A social engineer’s main goal is gaining unauthorized access to systems or information in order to commit fraud. In most cases the social engineer never comes face to face with the victim. Social Engineering is steadily increasing as cyber criminals exploit people in tough economic times. Anyone can be a target for social engineers, including small businesses.
Educate yourself and your employees
As a small business, you may always update your anti-virus software, but what other actions do you take to keep your business secure? For example, have you educated your employees recently on what information is safe to divulge and to whom they can divulge it? Understanding social engineering techniques can help you develop a plan for how to protect your business from them.
Before you give any information away, think about the following:
Why are you you being asked for this information? Is it usual to be asked for this sort of information in this format?
Is the request coming from a known source?
What consequences might come from misuse of the information you've been asked to provide or the action you have to take?
Is there pressure to take action now?
Using this list can help you think carefully before providing a response and make you more confident in your decision before divulging sensitive information.
Recognize the signs
The list below describes some of the more common social engineering techniques:
Impersonation:
They may pose as a repairman, helpdesk tech or trusted third party.
Name Dropping:
They may use names of people from your company/family to make you believe they know you and gain your trust.
Aggression:
They also may try to intimidate you by threatening to escalate to a manager / executive if you do not provide the information/access they have requested.
Conformity:
They may tell you that everyone else has provided the information so it’s fine for you to provide the same.
Friendliness:
Over time, they may contact you with an aim of building up a rapport with you. Eventually the social engineer will ask for sensitive information when he/she feels the trust has been built up.
Stay tuned for future posts on keeping your business secure, and check out online safety tips anytime on our
Good to Know
website.
Posted by Katrina Blake, Risk Analyst
Labels
Brazil
1
Business Photos
2
Chromebooks
1
consumer surveys
1
Economic Impact Report
3
Education
1
English
419
Events
3
Get Your Business Online
7
Gmail
8
GoMo
1
Google Ads
61
Google AdSense
4
Google Analytics
7
Google App Engine
1
Google Apps
60
Google Apps for Work
2
Google Calendar
6
Google Docs
18
Google Domains
3
Google Forms
1
Google Maps
15
google my business
16
Google Offers
1
Google Partners
2
Google Places
45
Google ReWork
1
Google Search
6
Google Shopping
2
Google Sites
7
Google Small Business
20
Google Small Business Blog
419
Google Small Business Community
9
Google Tags
4
Google+
9
Google+ stories
8
Help Desk Hangouts On Air
20
Holiday
3
Learn with Google
4
Livestream
1
Local Services
3
marketing
1
mobile
13
mobile optimization
4
mobile sites
4
Mobile Speed
1
National Small Business Week
3
Newsletter
3
Online security
3
Primer
2
Research
1
reviews
1
Rio de Janeiro
1
Road Trip
1
site design
1
Small Business Saturday
1
Small Business Week
4
Street View
1
TalkBin
2
Test My Site
1
Training
2
Webmaster Academy
2
YouTube
7
Archive
2018
Dec
Oct
Jul
Apr
Feb
Jan
2017
Oct
Aug
Jul
Jun
May
Apr
Mar
2016
Nov
Oct
Aug
Jul
Jun
May
Apr
2015
Dec
Nov
Oct
Sep
Aug
Jun
May
Apr
Mar
Feb
Jan
2014
Dec
Nov
Oct
Sep
Aug
Jul
Jun
May
2013
Nov
Oct
Sep
Aug
Jul
Jun
May
Apr
Mar
Feb
Jan
2012
Dec
Nov
Oct
Sep
Aug
Jul
Jun
May
Apr
Mar
Feb
Jan
2011
Dec
Nov
Oct
Sep
Aug
Jul
Jun
May
Apr
Mar
Feb
Jan
2010
Dec
Nov
Oct
Sep
Aug
Feed
Follow @googlesmallbiz
Follow
Site Feed