Frequently Asked Question
Social Engineering is when someone tricks you or your colleagues into giving away sensitive information by pretending to be a trustworthy person. This could be through a phone call, in-person visit where the attacker user friendly or urgent language to bypass your usual security checks or browsing your social media accounts.
Phishing, on the other hand, involves deceptive emails or messages that look like they come from a reputable source. These messages try to lure you into clicking on harmful links or sharing sensitive or confidential data, so its important to be cautious and verify the source before taking any action.
Phishing communication used by bad actors, the list is just an example and not exhaustive,
- Emails
- SMS
- Voice / Phone Calls
- QR Codes
Few Phishing Techniques
- Smishing (SMS Phishing) - Using SMS messages to trick users into clicking malicious links or providing sensitive and personal information
- Vishing (Voice Phishing) - Using phone calls or voicemail messages to deceive victims into revealing sensitive or personal information
- Angler Phishing - Impersonating customer service accounts on social media platforms to trick users into revealing sensitive information or downloading malware
- Search Engine Phishing / Spoof websites - Creating fake websites that mimic legitimate ones and may appear in search engine results to lure users to a malicious site where a user could enter their credentials or provide other information.
Tools and Techniques to help
Detection
- Urgency to do something
- Suspicious links, attachments
- URLS and From Address do not match the actual destination
- Spelling and Grammatic errors
- Unusual requests for information (credit card details) that you wouldn't normally provide.
Prevention
- Use Strong Passwords
- Enable Two-Factor or Multi-Factor Authentication
- Install Anti-Malware software to protect your devices from phishing attacks and other cyber threats
- Keep your devices, operating system, web browsers, other software and systems patched with the latest version to reduce security vulnerabilities
- Be Cautious with Emails and don't trust them from face value, Don't open attachments or click on links straightaway, verify the sender