{"id":2230,"date":"2017-08-09T07:01:49","date_gmt":"2017-08-09T12:01:49","guid":{"rendered":"https:\/\/www.stratospherenetworks.com\/blog\/?p=2230"},"modified":"2018-06-26T12:03:50","modified_gmt":"2018-06-26T17:03:50","slug":"need-know-social-engineering-cybersecurity-threats","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/need-know-social-engineering-cybersecurity-threats\/","title":{"rendered":"What You Need to Know About Social Engineering and Cybersecurity Threats"},"content":{"rendered":"<p><a href=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/06\/Security-breach-attack.jpg\"><img decoding=\"async\" class=\"alignleft size-medium wp-image-2184\" src=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/06\/Security-breach-attack-300x225.jpg\" alt=\"cybersecurity\" width=\"300\" height=\"225\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/06\/Security-breach-attack-300x225.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/06\/Security-breach-attack-768x576.jpg 768w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/06\/Security-breach-attack-1024x768.jpg 1024w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>With threats like ransomware making headlines frequently (first with the WannaCry bug and then various infrastructure attacks in the EU), many of us are worried about <a href=\"https:\/\/www.stratospherenetworks.com\/data-security-solutions.html\" target=\"_blank\" rel=\"noopener\">cybersecurity<\/a>.<\/p>\n<p>Malware evolves constantly, looking for ways to bypass security methods. One strategy in particular deals with social engineering.<\/p>\n<p>If you\u2019re not familiar with social engineering, it\u2019s a simple but devious concept. Essentially, third parties attempt to bypass security or access your information by disguising themselves as a friendly proxy. It\u2019s called \u201csocial engineering\u201d because external threats utilize information they discover about you \u2013 friends, family, contacts, etc. \u2013 and craft a fake message based on that.<\/p>\n<p>Here\u2019s an example:<\/p>\n<p>You might one day <a href=\"https:\/\/www.stratospherenetworks.com\/email-spam.html\" target=\"_blank\" rel=\"noopener\">get an email<\/a> from a bank account which says an unauthorized transaction was made. You open the email, slightly panicked, and at first glance everything looks official. You click the link inside the email and surprise! Turns out this was a malicious message.<\/p>\n<p>How could this be? Everything looked correct. Or did it?<\/p>\n<p>Going back, the email does indeed look pretty official. Even the sender\u2019s address seems correct. But, these are cleverly laid out traps meant to bypass the best line of defense: personal scrutiny.<\/p>\n<p>This scenario certainly sounds scary. Hackers are able to <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/spear-phishing-what-it-is-and-how-to-handle-it\/\" target=\"_blank\" rel=\"noopener\">mimic messages<\/a> from verified accounts without detection? How can you catch that?<\/p>\n<p>Fortunately, despite how clever aspects of social engineering are, there are numerous shortcomings and ways to protect yourself if you ever encounter a slightly suspicious message. For one, while these emails can often look precisely like an official email, what with official logo, footer text, and sender address, they\u2019re often littered with flaws.<\/p>\n<p>The first are small errors, like spelling, random changes in font style, and bad grammar. You might notice, suddenly, a line of text changes to the color blue. Or a sentence starts without capitalization. These tiny tidbits are dead giveaways because official emails are often sent by bots. Nothing is going to contain errors.<\/p>\n<p>Then there\u2019s the link. Perhaps the message you receive is from a friend\u2019s email address, and, trusting this, you click on it. The message, however, might look bizarre and contain a link to click on. This is usually a huge red flag, especially when dealing with sources of personal information. Any time a message asks you to click on a link, it\u2019s a sign someone might be after your info.<\/p>\n<p>Again, with the engineered bank email, let\u2019s say you do click on the link. From there, you\u2019re prompted to put in your login information. However, the page you\u2019re doing it on doesn\u2019t seem familiar. The cautious mind might notice the Web address looks completely wrong, and as it turns out, this login area is actually just you giving away your information.<\/p>\n<p>It\u2019s quite alarming, isn\u2019t it? The thing to remember is that social engineering uses your own information against you, and that <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-guard-email-hosted-spam-solution\/\" target=\"_blank\" rel=\"noopener\">catching these threats<\/a> requires an extra level of care. Always be suspicious when unverified claims are made about transactions, hacks, or exploits. Official companies will often call, text, or alert you if there are major problems with your account.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With threats like ransomware making headlines frequently (first with the WannaCry bug and then various infrastructure attacks in the EU), many of us are worried about cybersecurity. Malware evolves constantly, looking for ways to bypass security methods. One strategy in &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/need-know-social-engineering-cybersecurity-threats\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":3391,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-2230","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-knowledge-base"],"yoast_head":"<title>What You Need to Know About Social Engineering and Cybersecurity Threats<\/title>\n<meta name=\"description\" content=\"Hackers sometimes use social engineering tactics to trick you into giving them access to sensitive information. Here&#039;s how to thwart their attempts.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/need-know-social-engineering-cybersecurity-threats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What You Need to Know About Social Engineering and Cybersecurity Threats\" \/>\n<meta property=\"og:description\" content=\"Hackers sometimes use social engineering tactics to trick you into giving them access to sensitive information. Here&#039;s how to thwart their attempts.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/need-know-social-engineering-cybersecurity-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2017-08-09T12:01:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-06-26T17:03:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"dsparks\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"dsparks\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/need-know-social-engineering-cybersecurity-threats\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/need-know-social-engineering-cybersecurity-threats\/\"},\"author\":{\"name\":\"dsparks\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"headline\":\"What You Need to Know About Social Engineering and Cybersecurity Threats\",\"datePublished\":\"2017-08-09T12:01:49+00:00\",\"dateModified\":\"2018-06-26T17:03:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/need-know-social-engineering-cybersecurity-threats\/\"},\"wordCount\":538,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/need-know-social-engineering-cybersecurity-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"articleSection\":[\"Knowledge Base\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/need-know-social-engineering-cybersecurity-threats\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/need-know-social-engineering-cybersecurity-threats\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/need-know-social-engineering-cybersecurity-threats\/\",\"name\":\"What You Need to Know About Social Engineering and Cybersecurity Threats\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/need-know-social-engineering-cybersecurity-threats\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/need-know-social-engineering-cybersecurity-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"datePublished\":\"2017-08-09T12:01:49+00:00\",\"dateModified\":\"2018-06-26T17:03:50+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"description\":\"Hackers sometimes use social engineering tactics to trick you into giving them access to sensitive information. Here's how to thwart their attempts.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/need-know-social-engineering-cybersecurity-threats\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/need-know-social-engineering-cybersecurity-threats\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/need-know-social-engineering-cybersecurity-threats\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"width\":1024,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/need-know-social-engineering-cybersecurity-threats\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What You Need to Know About Social Engineering and Cybersecurity Threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\",\"name\":\"dsparks\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"caption\":\"dsparks\"},\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/\"}]}<\/script>","yoast_head_json":{"title":"What You Need to Know About Social Engineering and Cybersecurity Threats","description":"Hackers sometimes use social engineering tactics to trick you into giving them access to sensitive information. Here's how to thwart their attempts.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/need-know-social-engineering-cybersecurity-threats\/","og_locale":"en_US","og_type":"article","og_title":"What You Need to Know About Social Engineering and Cybersecurity Threats","og_description":"Hackers sometimes use social engineering tactics to trick you into giving them access to sensitive information. Here's how to thwart their attempts.","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/need-know-social-engineering-cybersecurity-threats\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2017-08-09T12:01:49+00:00","article_modified_time":"2018-06-26T17:03:50+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","type":"image\/png"}],"author":"dsparks","twitter_card":"summary_large_image","twitter_misc":{"Written by":"dsparks","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/need-know-social-engineering-cybersecurity-threats\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/need-know-social-engineering-cybersecurity-threats\/"},"author":{"name":"dsparks","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"headline":"What You Need to Know About Social Engineering and Cybersecurity Threats","datePublished":"2017-08-09T12:01:49+00:00","dateModified":"2018-06-26T17:03:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/need-know-social-engineering-cybersecurity-threats\/"},"wordCount":538,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/need-know-social-engineering-cybersecurity-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","articleSection":["Knowledge Base"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/need-know-social-engineering-cybersecurity-threats\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/need-know-social-engineering-cybersecurity-threats\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/need-know-social-engineering-cybersecurity-threats\/","name":"What You Need to Know About Social Engineering and Cybersecurity Threats","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/need-know-social-engineering-cybersecurity-threats\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/need-know-social-engineering-cybersecurity-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","datePublished":"2017-08-09T12:01:49+00:00","dateModified":"2018-06-26T17:03:50+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"description":"Hackers sometimes use social engineering tactics to trick you into giving them access to sensitive information. Here's how to thwart their attempts.","breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/need-know-social-engineering-cybersecurity-threats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/need-know-social-engineering-cybersecurity-threats\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/need-know-social-engineering-cybersecurity-threats\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","width":1024,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/need-know-social-engineering-cybersecurity-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What You Need to Know About Social Engineering and Cybersecurity Threats"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c","name":"dsparks","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","caption":"dsparks"},"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2230","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=2230"}],"version-history":[{"count":1,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2230\/revisions"}],"predecessor-version":[{"id":2231,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2230\/revisions\/2231"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/3391"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=2230"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=2230"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=2230"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}