• Home
  • Blog
  • Products
    • Partner Subscription
    • Breach Prevention Platform
    • HIPAA Services
    • Dark Web Monitoring
    • In-Email Training & Email Analysis | Catch Phish Outlook Plug-In
  • Request a Demo
  • About Us
  • Contact Us

Call us at: 877-275-4545

Partner? Login here
Breach Secure Now!Breach Secure Now!
  • Home
  • Blog
  • Products
    • Partner Subscription
    • Breach Prevention Platform
    • HIPAA Services
    • Dark Web Monitoring
    • In-Email Training & Email Analysis | Catch Phish Outlook Plug-In
  • Request a Demo
  • About Us
  • Contact Us

Hacker Helper

September 11, 2019 Posted by Art Gross Security No Comments

Are You a Hacker Helper?

Here you go, let me get the door for you.  Are you looking for access to my company’s network?  One moment, let me get those login credentials for you.

Of course, this sounds ridiculous.  But in reality, it is exactly what is happening.  Cybercriminals use advanced social engineering to get to the weakest link in any organization, and that link is the same at every business, in every vertical, in every market.   Humans.

A recent study from Proofpoint found that in 18 months of researching attack trends, 99% of emails used to distribute malware required human interaction to click a link, open an attachment, accept a security warning, or perform another task.   This leads cybercriminals to focus on targeting humans, not necessarily systems.

Easy Access

While it is C-level and upper management that has the greatest access to data, it is sales, marketing, and HR that are most easily found online through quick searches.  Contact information for these “very attacked people” or VAPs, could easily be found for 36% of the linked identities.  Corporate websites, social media, or other channels provided easy access to finding out who exactly they needed to contact, and how they could easily do it.

Once hackers have the contact information, they can use a barrage of methods to get to the person, often creating multiple methods of attack on the same person.  Additionally, sending out group messages to common group addresses can target multiple users at once.  And all that it takes is one HR person to fail the phishing test to [email protected] and release hundreds of records on employee or client personal information.

This method often proves to be lucrative to exploiting a company, and with minimal effort going into the attack, the speed at which these attacks happen is also increasing.  Maximum output for minimum input.

Protecting the human factor of a business is no longer limited to human resources, it has become equally as important in cybersecurity.

Tags: CybersecurityHacking
No Comments
Share
1

You also might be interested in

Social Media Security Tips

Social Media Security Tips

Mar 3, 2019

Social media allows you to stay connected to people that[...]

The State of Compliance

The State of Compliance

Mar 27, 2019

We are all aware of federal compliance regulations when it[...]

Cybersecurity Common Sense

Cybersecurity Common Sense

Apr 10, 2019

How many times do I have to tell you? Sadly,[...]

Leave a Reply Cancel Reply

Dark Web Assessments

Search

Recent Posts

  • Data Privacy Week January 27, 2023
  • Phishing: Targeted Attacks January 20, 2023
  • Human Error January 13, 2023
  • New Year’s Resolution: Train More January 6, 2023
  • Social Security Scams December 30, 2022

Contact Us

  • Breach Secure Now!
  • 55 Madison Ave, Suite 400 Morristown, NJ 07960
  • 877-275-4545
  • info@breachsecurenow.com

Get Social

Schedule a Demo

Recent Blog Posts

  • Data Privacy Week January 27, 2023
  • Phishing: Targeted Attacks January 20, 2023
  • Human Error January 13, 2023

© 2023 · Breach Secure Now!

Prev Next