March 29, 2016

"Social hacking is the criminal act of manipulating people to surrender confidential information."

TwinSystems: In most cases, the perpetrators are looking for opportunities to take advantage of vulnerable or naïve people, by deceiving them into handing over sensitive information.

'This information can be used against them and provide a gateway for hackers to gain access to bank accounts, computer passwords and other personal details. Hackers can destroy victim’s lives and social hacking in particular is a favoured choice. The core reason for this is because it is one of the most straightforward hacking techniques. For instance, trying to convince someone to give you their password in a threatening or underhand way is far less time consuming than attempting to physically hack their account.

'A major part of personal security is being aware of who to trust and remaining vigilant at all times. It is important to safeguard your personal information by following general best practice techniques. With average UK salary and savings currently at £26,500 and £7,838 respectively, there is potential for hackers to defraud victims out of considerable sums of money if committed on a wide scale. Consequently, the threat to businesses of all sizes, especially those that keep large amounts of cash in the bank, is potentially severe.

'The weakest link in a personal security chain is the individual who is too trusting. The harsh truth is that you can’t trust everyone, especially where technology is involved. As a result, businesses must ensure that all members of staff within their hierarchy are aware of personal security threats and understand how they are expected to react in different situations. You can have the most advanced security systems and protocols in place, however if staff are not adequately trained to respond when confronted by these criminals and inadvertently release sensitive personal information, none of it will matter. It is therefore recommended that you invest in the appropriate security training to provide staff with the necessary knowledge they require to always act in the most secure way possible.'

“If you were to start a new role tomorrow, how would you address the threat of social hacking when looking to protect the data of your business?” Experts give their opinions here

No comments: