top of page
Writer's picturePeter Warmka

Protection Against Social Engineering Threats: Simplified, Yet Effective


In today’s digital age, social engineering threats have become increasingly common and

sophisticated. These threats can manifest through the following five communication channels:

email, text messages, social media messaging, voice telephone calls, and face-to-face

encounters. The key to safeguarding yourself and your employer is to exercise caution and

healthy skepticism when someone you do not personally know reaches out to you through any one of these communication channels.


How to Protect Yourself: A Simplified Guide


Email: As email continues to be a common channel for social engineering phishing attacks, be

very cautious of unsolicited emails, especially those asking you to perform a specific action like clicking on links or opening attachments. These links and/or attachments can contain malicious code.


Verification: If sent to you by a person, verify by telephone or text message with this sender

prior to trusting. If sent by an organization, go directly to the organization’s website to search

for this information instead of trusting any link or attachment contained in the body of the

email.


Text Messages: Just like emails, text messages can include malicious links and/or malicious

attachments. As they are increasingly being utilized for basic smishing attacks, it is imperative

to verify the identity of the sender prior to clicking on the link or opening the attachment.


Verification can be conducted by telephoning or emailing the sender. If allegedly sent by an

organization, go directly to the organization’s website to verify this information, and do not

click on the link or open the attachment received in the text message.


Social Media Messaging: This is the communication channel most preferred by sophisticated

threat actors for advanced spear phishing attacks. Threat actors create fake profiles to directly

target YOU. These profiles will incorporate commonalities thereby increasing the likelihood

that you will accept their connection request and welcome interaction with them. The danger

is when this “trusted” fake profile asks you to undertake an action. It may be clicking on a

malicious link or opening an attachment. The profile may ask you for sensitive information or

manipulate you into a romance or investment scam.


Verification: While it is strongly recommended to never accept a connection invitation from

someone you don’t know, it is imperative to verify the profile before undertaking any

requested action which could result in devastating consequences such as identity theft, financial fraud, or espionage. Verification can easily be accomplished by conducting Google searches on this individual as well as contacting individuals who are listed as mutual contacts. Unless verification can be accomplished, do not comply with anything being requested from you.


Telephone Calls: Often referred to as vishing, social engineers can pretend to be whomever

they want to obtain sensitive information and/or manipulate their targets to undertake a

specific act such as dispersing funds, resetting passwords, or providing access to secured areas (gated communities/restricted areas within a company, etc.). To add credibility, such vishers will frequently spoof the caller ID number seen by the receipt of the call. They are also increasingly cloning and utilizing the voice of a party known to you. More severe vishing cases have included fake kidnapping scenarios.


Verification: If requested by the caller to provide sensitive information and/or to undertake a

specific action, which if fraudulent, could result in dire consequences for you or your company,

STOP! First, verify that they are who they say they are. Request a callback number and/or that

they provide the instructions in writing. In the case of a kidnapping ransom demand, ensure

that your family has a plan in place to utilize a code word verifying that the emergency is in fact, legitimate.


Face-to-face: In-person interactions can also be used for social engineering. Be cautious of

strangers approaching you attempting to obtain sensitive information or asking that you

undertake a specific action.


Verification: Ask for identification or verification of the person’s affiliation if they claim to

represent an organization or authority.


Remember that the potential danger lies in unsolicited requests for action or information.

Always prioritize “verification before trust.” It’s essential to remain vigilant and exercise

caution, regardless of the communication channel. By following these simple steps, you can

protect yourself and loved ones from falling victim to social engineering threats and maintain

your personal security in an increasingly interconnected world.


Security is not convenient, but neither is becoming a victim. The choice is in your hands.


 

About the Counterintelligence Institute


Founded by former CIA senior intelligence officer Peter Warmka, the Counterintelligence Institute’s mission is to assist your corporations, government offices, academic institutions and non-profit organizations in protecting your sensitive information and personal data records against security breach attempts. Our online and onsite training services focus on transforming the human factor from being the weakest link in security to becoming the most effective defensive tool against security threats against your company and personal life.






65 views0 comments

Comments


bottom of page