{"id":188,"date":"2019-05-28T01:41:35","date_gmt":"2019-05-27T23:41:35","guid":{"rendered":"https:\/\/lars-hilse.de\/lhx18\/?p=188"},"modified":"2019-05-28T01:42:54","modified_gmt":"2019-05-27T23:42:54","slug":"protecting-your-organisation-from-the-risk-of-social-engineering","status":"publish","type":"post","link":"https:\/\/lars-hilse.de\/lhx18\/2019\/05\/protecting-your-organisation-from-the-risk-of-social-engineering\/","title":{"rendered":"Protecting your organisation from the risk of social engineering"},"content":{"rendered":"<div class=\"ttr_start\"><\/div>\n<figure class=\"wp-block-image\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"350\" height=\"100\" src=\"https:\/\/i0.wp.com\/lars-hilse.de\/lhx18\/wp-content\/uploads\/2019\/05\/lhx_blog_content.jpg?resize=350%2C100&#038;ssl=1\" alt=\"\" class=\"wp-image-176\" srcset=\"https:\/\/i0.wp.com\/lars-hilse.de\/lhx18\/wp-content\/uploads\/2019\/05\/lhx_blog_content.jpg?w=350&amp;ssl=1 350w, https:\/\/i0.wp.com\/lars-hilse.de\/lhx18\/wp-content\/uploads\/2019\/05\/lhx_blog_content.jpg?resize=300%2C86&amp;ssl=1 300w\" sizes=\"auto, (max-width: 350px) 100vw, 350px\" \/><\/figure>\n\n\n\n<p>Social engineering describes the process by which an attacker gains access to a facility or system by manipulating someone to grant them access they shouldn\u2019t have in the first place.&nbsp;<\/p>\n\n\n\n<p>When speaking of social engineering, there are many examples you are familiar with in the wild\u2026 the presidential election in 2016 for instance was manipulated by a foreign power. The encounters in the field are almost infinite.<\/p>\n\n\n\n<p>That being said, social engineering is probably the gravest threat to your organisation.<\/p>\n\n\n\n<p>When an attacker wants access to your stuff they will make use of that as a last resort. Systems today are so well protected that getting in through the \u201cfront door\u201d is often more complex than gaining access to a building or facility just by going there, and making the door man believe the work for the telecommunications company and are here on a maintenance contract. Yes, the attacker will wear the proper attire and have the necessary documents with them\u2026 only they are forged.&nbsp;<\/p>\n\n\n\n<p>Above is probably a very good visual of a seemingly harmless incident of social engineering\u2026 but where is the telco guy going to go now that he has passed the door man? Well, to the most sensitive parts of the building or course, where you\u2019re IT is housed\u2026 and the attacker will be so convincing towards the doorman that he will probably show him the way to that are of your building, and most likely even unlock the room for them.&nbsp;<\/p>\n\n\n\n<p>If you don\u2019t know the concept of social engineering, here is a visual: a few years back I was invited to monitor an incident at a university.<\/p>\n\n\n\n<p>The young man in his early 30s and heard the University on a Friday afternoon and went directly to the secretary\u2018s desk. He had previously scouted out that all other personnel would have left at that time; including the system administrators.<\/p>\n\n\n\n<p>He was able to produce all necessary paperwork, and was dressed appropriately even wearing a jacket with a renowned computer logo on the front and back<\/p>\n\n\n\n<p>The secretary didn\u2019t know any better, and how could she? Since the paperwork checked out, despite the fact that it was altogether fraudulent, she sent him to the server room and even unlocked the door for him.<\/p>\n\n\n\n<p>Her office was a little bit off from the main Corridor so she didn\u2019t notice when over a period of approximately two hours he manage to clean out the server room of pretty much every piece of equipment that was hooked up to the universities network.<\/p>\n\n\n\n<p>It took until Sunday of that weekend until a professor noticed that he wasn\u2019t getting any emails sent, and couldn\u2019t receive any emails either.<\/p>\n\n\n\n<p>He then contacted the universities system administrator through his private telephone line with an attempted to remotely connect to the Universities network, which obviously failed.<\/p>\n\n\n\n<p>Both the professor and the administrator met at the universities main building, and entered the server room to find it empty.<\/p>\n\n\n\n<p>The thief had even taken every single patch cable.<\/p>\n\n\n\n<p>You see, social engineering, and the consequences thereof, may not be underrated in your risk management strategy; particularly the risk involved in cyber.<\/p>\n<div id='steempress_sp_comment_feed'><iframe name='steempress_sp_embed'  onload=\"iFrameResize({ scrolling:true, heightCalculationMethod:'min'})\" src=\"https:\/\/two.steempress.io\/?author=larshilse&permlink=protectingyourorganisationfromtheriskofsocialengineering-jmj1458jlp&display_comment=true&parent=https:\/\/lars-hilse.de\/lhx18\/2019\/05\/protecting-your-organisation-from-the-risk-of-social-engineering\/\" style=\"border: 0; width: 100%; margin-bottom: 0px !important;\"><\/iframe><\/div><div class=\"ttr_end\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Humans are still the weakest link in cyber security, and they lack training to become aware of the risks. This is a very good example. <\/p>\n","protected":false},"author":1,"featured_media":192,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6,2,13,52],"tags":[21,42,54],"class_list":{"0":"post-188","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","6":"hentry","7":"category-cyber-crime","8":"category-cyber-security","9":"category-risk-management","10":"category-social-engineering","11":"tag-cyber-crime","12":"tag-cybersecurity","13":"tag-social-engineering","15":"fallback-thumbnail"},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/lars-hilse.de\/lhx18\/wp-content\/uploads\/2019\/05\/protecting-your-organisation-from-the-risk-of-social-engineering1.jpg?fit=640%2C360&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/paluiP-32","jetpack_likes_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/lars-hilse.de\/lhx18\/wp-json\/wp\/v2\/posts\/188","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lars-hilse.de\/lhx18\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lars-hilse.de\/lhx18\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lars-hilse.de\/lhx18\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lars-hilse.de\/lhx18\/wp-json\/wp\/v2\/comments?post=188"}],"version-history":[{"count":2,"href":"https:\/\/lars-hilse.de\/lhx18\/wp-json\/wp\/v2\/posts\/188\/revisions"}],"predecessor-version":[{"id":191,"href":"https:\/\/lars-hilse.de\/lhx18\/wp-json\/wp\/v2\/posts\/188\/revisions\/191"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lars-hilse.de\/lhx18\/wp-json\/wp\/v2\/media\/192"}],"wp:attachment":[{"href":"https:\/\/lars-hilse.de\/lhx18\/wp-json\/wp\/v2\/media?parent=188"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lars-hilse.de\/lhx18\/wp-json\/wp\/v2\/categories?post=188"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lars-hilse.de\/lhx18\/wp-json\/wp\/v2\/tags?post=188"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}