3 Ways to Close the Social Engineering Security Gap

Jeff Wasserman/Shutterstock.com

Despite the fact that phishing attacks are a well-known threat, they continue to be successful.

Ira Winkler is president of Secure Mentem and co-host of “The Irari Report,” and Dr. Larry Ponemon is chairman of the 3M-sponsored Visual Privacy Advisory Council and the chairman and founder of the Ponemon Institute.

Your workers are your most valuable asset. But they can also be your biggest security vulnerability.

Today, hackers are using social engineering to bypass technical safeguards – accessing sensitive information in new ways verbally, electronically, physically and visually. The specific tactics vary, but they all involve manipulating people to do something they wouldn’t otherwise do.

Phishing emails are the most prominent form of social engineering. The Anti-Phishing Working Group in March reported 84 million new malware samples were captured in 2015. And despite the fact that phishing attacks are a well-known threat, they continue to be successful. Nearly one in three workers today open phishing messages and about one in 10 click on attachments, according to Verizon’s 2016 Data Breach Investigations Report.  

Social engineering can involve impersonation, such as someone posing as an IT help-desk technician or a delivery person, to gain physical or electronic access to sensitive information. It also can involve an employee persuading their fellow colleagues under false pretenses to give up sensitive data or network access, which is the method Edward Snowden used to gather classified material, Reuters reported Nov. 7, 2013.

The Importance of Good Governance

Social engineering most commonly involves exploiting companies that have poorly implemented policies and procedures in place, or lack them altogether.

Policies and procedures should define worker responsibilities and appropriate behaviors for dealing with potential social-engineering tactics. However, even the best policies and procedures can be futile if they’re not communicated properly to workers. This makes awareness training critical. Workers should understand the value of information they handle, possible threats to this information, and the policies and procedures in place for dealing with these threats first-hand.

For example, many companies have a policy against writing down passwords, but it is still common practice. IT managers should regularly walk through the building and see if policies are being followed.

Are passwords visually accessible? Are valuable documents left on desks or near printers? Can people see sensitive information on computer monitors? Training should be continuous and connected to the relevant issues observed during the walkthroughs.

Cybersecurity gaps can similarly be monitored. Conducting a mock phishing test can measure your workers’ behavior before an actual phishing scheme does. Those who fail the test can receive remediation training.

Adding Layers of Protection

Complete policy compliance among your workers is always the goal. But you should still plan for those instances where workers are compromised, especially as hackers continue to adjust social engineering tactics and seek new ways to exploit workers.

That’s why adding layers of protection as part of a defense-in-depth security approach is essential.

For example, privacy filters can help protect sensitive data displayed on computer and device screens by blocking unauthorized side views. Other important protection measures include implementing clean-desk policies, using password-protected screensavers and requiring that sensitive information be printed and stored in locked areas.

Regular penetration testing can help identify vulnerabilities in these areas, as well as other gaps, such as ineffective building security, poorly trained security personnel, and employees unwilling to confront strangers.

Paired with regular training, these cybersecurity measures and physical layers of protection can help thwart attacks from many different angles.

Take Charge of Your Security

Too often, a company will develop a sound security policy but fail to implement it. This can be a recipe for disaster against social engineering tactics that are only becoming smarter and more targeted.

After all, good security doesn’t result from wishful thinking or good luck. Rather, it’s the result of a good governance approach that both informs employees and drives their behaviors, with additional security safeguards providing added layers of critical security.

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.