TechHow ToWhat is Social Engineering - How to avoid Social...

What is Social Engineering – How to avoid Social Engineering Attack

-

- Advertisment -spot_img

Social engineering is a type of cyber attack, in which a cyber attacker uses psychological tactics and strategies, as well as relationships with people. They try to get the user’s password, bank account number and PIN code and amount.

They are also succeeding in this. It is usually easier to win a person’s trust by attracting them than by hacking.

So Cyber ​​Attackers allow you to download enticing messages, music, movies for free and at the same time secretly install malicious software on the computer to gain access to the computer user and take control of the computer.

You May Also Like:  Two amazing features coming soon on WhatsApp, chat style will change

Similarly, cyber attackers use cyber attacks to fool and intimidate people into obtaining passwords. In this way, they even try to get money deposited in their account from the bank and succeed in trapping such people directly.

Cyber-attackers send emails, use fake websites that look like real ones, send messages and even use phone calls, and win people’s trust through psychological activities. Social engineering is the act of deceiving, stealing and selling data directly to the user and damaging the value and reputation of the organization financially.

To carry out a social engineering attack, cyber attackers use phishing emails, telephone / mobile conversations (Vishing), pen drives (USB Sticks), websites (Internet freebies), physical access (Physical impersonation) and electronic waste (Electronics). Waste) is used as a medium.

How to avoid social engineering attack?

You May Also Like: https: Two amazing features coming soon on WhatsApp, chat style will change

Don’t reply to suspicious emails as they may be phishing emails.

Do not click on suspicious attachments of emails and links found in them.

To search and identify the authenticity of the sender by hovering the crosser in the email address and the link embedded in the email.

Generally not providing sensitive information in telephone / mobile conversations.

Don’t give your personal details to the caller under the pretext of gift, lottery, working visa etc.

If there is any doubt about the caller ID, message sending ID and shirt code, search and identify the authenticity.

If there is any doubt about the name of the caller, the name of the organizational unit or an external company, take some time to search and send your details only after identifying the authenticity.

Pen drives (USB sticks) can be attacked by putting malicious software such as viruses, key loggers, trojans, ransomware, so use the pen drive only after scanning for viruses.

Usually do not use pen drives (USB sticks) on very important infrastructure (sensitive infrastructure like servers).

If an unfamiliar pen drive (USB Sticks) is found, do not use it on your computer and do not open the contents of such pen drive (USB Sticks).

Provide your personal details only by identifying the official website.

Do not download and use cracked and pirated software.

Don’t use unsafe websites like Emu, BitTorrent, Araj.

Don’t use insecure websites (Internet freebies) that offer various offers of movies, songs, music videos, software, books, etc. for free.

Keep passwords and physical locks on workplace computers.

Accurately identify a person before giving them any access to their computer or device.

You need to arrange proper security guard in the workplace.

Manage to do electronic waste disposal.

You May Also Like:Customer  Engagement: Why Live Shopping is the Answer

Since even electronic materials that do not work can contain sensitive details, such materials should not be disposed of indiscriminately and should be disposed only by destroying sensitive details.

Dispose of expired electronic cards such as ID cards, ATM cards, access cards, etc. before disposing of any details from those cards.

Only dispose of electronic data on useless hard disk pen drives, memory sticks and USB flash drives.

[youtube-feed] [youtube-feed channel="setnewsbox" subscribetext="Subscribe to My Channel"]
Gyanendra
I am very much passionate about the quiz, writing, and extremely enthusiastic to learn the modern scientific and technological discoveries in all over the world.

Leave A Reply

Please enter your comment!
Please enter your name here

Latest news

WhatsApp: How To Schedule Messages On WhatsApp, Here Are Tips For Android And iOS Phones

WhatsApp: How To Schedule Messages On WhatsApp, Here Are Tips For Android And iOS Phones Find out what Android and...

Java Development Jobs: Is It Right Career Path For You To Follow

When looking for a new job route or just trying to figure out where you want to go in...

How do I sell something in a Facebook buy and sell group or How can I post on Facebook Classifieds 2022

Facebook offers free Facebook Classifieds - How do I sell something in a Facebook buy and sell group? FaceBook Classifieds:...

Garena Free Fire Today Redeem codes 12 January: Free Diamond Redeem Codes Win Diamonds

Garena Free Fire Today Redeem codes 12 January: Free Diamond Redeem Codes Win Diamonds Free Fire Redeem Code Today 12...
- Advertisement -spot_imgspot_img

Everybody should know how much Virat Kohli charges for a post on Instagram? You will be shocked to know now

Everybody should know how much Virat Kohli charges for a post on Instagram? You will be shocked to know...

How to Backup iPhone 7 to 7s to iCloud and Your Computer 2022

How To Backup iPhone 7 to 7s with iCloud and Your Computer What a backup? For example, with PCs and Macs,...

Must read

WhatsApp: How To Schedule Messages On WhatsApp, Here Are Tips For Android And iOS Phones

WhatsApp: How To Schedule Messages On WhatsApp, Here Are...

Java Development Jobs: Is It Right Career Path For You To Follow

When looking for a new job route or just...
- Advertisement -spot_imgspot_img

You might also likeRELATED
Recommended to you

Ads Blocker Image Powered by Code Help Pro
Ads Blocker Detected!!!

We have detected that you are using extensions to block ads. If you want to read our article then please deactivate your AdBlocker from your browser.

Refresh
Powered By
CHP Adblock Detector Plugin | Codehelppro