{"id":791,"date":"2016-11-29T22:33:27","date_gmt":"2016-11-29T22:33:27","guid":{"rendered":"https:\/\/wwfins.com\/?p=791"},"modified":"2016-11-29T22:33:27","modified_gmt":"2016-11-29T22:33:27","slug":"seven-reasons-why-you-need-to-protect-your-business-from-social-engineering-now","status":"publish","type":"post","link":"https:\/\/wwfins.com\/?p=791","title":{"rendered":"Seven Reasons Why You Need to Protect Your Business from Social Engineering NOW"},"content":{"rendered":"<p class=\"p1\"><span class=\"s1\">The holidays are notorious for an uptick in seasonal scams and cyber phishing schemes. It&#8217;s time we addressed a cyber security issue that\u2019s a big deal in all of our industries right now: Social Engineering.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\"><b>What is social engineering?<\/b><\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">Social Engineering Fraud is described as when an employee is intentionally misled into sending money or diverting a payment based on fraudulent information that is provided to them in a written or verbal communication such as an email, fax, letter or phone call. A social engineering attack is typically very complex because it relies on psychological manipulation to get people to share confidential information.<\/span><\/p>\n<p class=\"p3\"><!--more--><\/p>\n<p class=\"p3\"><span class=\"s1\"><b>Here\u2019s why you need to take steps to protect your business from social engineering: <\/b><\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">1. Businesses of all sizes are affected.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">2. One in two small businesses and five in six large businesses were targeted at least once within the past year. <\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">3. Attacks on businesses have risen 91% in the last year.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">4. $1 billion was stolen from businesses over two years via an international spear phishing scheme that targeted bank employees.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">5. Many insurance policies do NOT cover this. If they do, there are many steps involved to activate the coverage, which the customer is unaware of.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">6. Social engineering is not just an email issue. It can occur via a fax or a letter as well as over the phone. <\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">7. In a recent survey of the security industry, IT security experts listed social engineering as the number one hacking method. <\/span><\/p>\n<p class=\"p3\"><span class=\"s1\"><b>How can you protect your business from social engineering? <\/b><\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">For starters, educate your employees with regular training and put policies in place for everyone in your company.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">Here are a few tips you can share with them right away:<\/span><\/p>\n<ul>\n<li class=\"li3\"><span class=\"s1\">Never click on any strange links. <\/span><\/li>\n<li class=\"li3\"><span class=\"s1\">Never give away confidential information to strangers. <\/span><\/li>\n<li class=\"li3\"><span class=\"s1\">Always check the recipient of an email and the source of the message.<\/span><\/li>\n<li class=\"li3\"><span class=\"s1\">Call the party (i.e., the customer) to verify the information in the email, fax or letter.<\/span><\/li>\n<li class=\"li3\"><span class=\"s1\">If someone is calling the office directly, ask for a call back number and hang up. Never give into demands to give confidential information, including usernames and passwords, over the phone on the spot.<span class=\"Apple-converted-space\">\u00a0 \u00a0<\/span><\/span><\/li>\n<li class=\"li3\"><span class=\"s1\">Only install software from trusted sources. Your IT company may be able to help with this by creating administrative passwords that must be entered before anyone can install software.<\/span><\/li>\n<\/ul>\n<p class=\"p3\"><span class=\"s1\">You should also work with an IT company that can monitor your systems regularly. To keep up with new scams, your technology needs to be monitored and updated frequently. <\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">For more information on Social Engineering and insurance policies, please give us a call at (305) 666-6636.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">References:<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">Ashford, W. (2016, February 11). Social engineering is top hacking method, survey shows. Retrieved October 14, 2016, from <a href=\"http:\/\/www.computerweekly.com\/news\/4500272941\/Social-engineering-is-top-hacking-method-survey-shows\" target=\"_blank\" >http:\/\/www.computerweekly.com\/news\/4500272941\/Social-engineering-is-top-hacking-method-survey-shows<\/a><\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">2016 Internet Security Threat Report. (n.d.). Retrieved October 14, 2016, from <a href=\"https:\/\/www.symantec.com\/security-center\/threat-report\" target=\"_blank\" >https:\/\/www.symantec.com\/security-center\/threat-report<\/a> <\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">Social Engineering Fraud Endorsement. (n.d.) Retrieved October 14, 2016.\u00a0<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">Zaharia, A. (2016, May 12). 10 Alarming Cyber Security Facts that Threaten Your Data [Updated]. Retrieved October 14, 2016, from <a href=\"https:\/\/heimdalsecurity.com\/blog\/10-surprising-cyber-security-facts-that-may-affect-your-online-safety\/\" target=\"_blank\" >https:\/\/heimdalsecurity.com\/blog\/10-surprising-cyber-security-facts-that-may-affect-your-online-safety\/<\/a><\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">Travelers Insurance, Social Engineering Fraud Endorsement, Coverage Highlights for Financial Institution Bonds, February 2016<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p class=\"p1\">The holidays are notorious for an uptick in seasonal scams and cyber phishing schemes. It&#8217;s time we addressed a cyber security issue that\u2019s a big deal in all of our industries right now: Social &#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/wwfins.com\/index.php?rest_route=\/wp\/v2\/posts\/791"}],"collection":[{"href":"https:\/\/wwfins.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wwfins.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wwfins.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/wwfins.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=791"}],"version-history":[{"count":1,"href":"https:\/\/wwfins.com\/index.php?rest_route=\/wp\/v2\/posts\/791\/revisions"}],"predecessor-version":[{"id":792,"href":"https:\/\/wwfins.com\/index.php?rest_route=\/wp\/v2\/posts\/791\/revisions\/792"}],"wp:attachment":[{"href":"https:\/\/wwfins.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=791"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wwfins.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=791"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wwfins.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=791"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}