Try  HackMD Logo HackMD

Intro Cybersecurity

Security Awarness

Social Engineering Red Flags

manipulating, influencing or decieve

Spot Red Flags

I. Why hackers do what they do

  1. money
  2. creating tension
  3. corporate espionate
  4. personal entertainment
    75B devices connected online
    How to stop them

II. different types of social eng

  1. Phishing
    Pretexting - gather info on social media
    Quid Pro Quo - getting something in exchange for something
    Goal: trick you to give away sensitive information
    Spear fishing
    • get you to react
    • verify sus msg
  2. Emails
  3. Untrustworthy characters within your organization
    22% insider breachers (medical, finance, public admin)

Thread Landscape:
stay alert and skeptical
Types of attacks
ID specific actions to reduce risk

Goal of social eng:

  1. gain your trust and then exploit you
  2. to get info they want

Smishing

  • phishing from texts
    Disinformation
  • decieve and receieve
    Cellphone towers, after a disinformation

MalWare:
data breaches, org's network is broken into
info is sold to other bad actors for a profit
randsomeware - scrambles data in your computer and then the ransome is paid

Spyware:

  • infect devices
  • gather info about you

Malicious Apps

  • update to your fave apps
  • download app
  • hackers hide program

III. Spotting red flags in email

  • payroll, holiday, policy changes
Checklist:
1. Subject line: click-bate vibes
2. To, From, Reply-to: are they verified
3. Date: unusual time
4. Links: asking to download a link or receieve punishment. However mouse over CTA button to expose actual link
5. Content of email: does it provoke an emotion

Mining personal information in online social

Employees falling to attacks:

  1. fired
  2. fined

actions to take for protection

Business risk:

  • global cost of cybercrims is $11.4M / min
  • cyberattacks seen an 80% increase 2020-2022
  • orgs fall victim to cybercrime every 11 sec

Attack Examples

http - directions on how info is transfered across the internet
http(s) - s is secure connection

Public Wifi/Coffeeshops

  • unsecure wifi connections
  • never connect to public wifi or create a VPN

Tailgating - pretending to be an employee and coming in to access computer

Flash Drive Attacks

Vishing - voice phising to social eng someone. Hacker has you call a fake support number

Questions:
what VPN option do we have