Could You Spot a Social Engineering Attack?

What Makes Social Engineering Effective?Social engineering is the equivalent of pointing to an imaginary spot on someone?s shirt, only to flick their nose when they look down — by posing as someone trustworthy, a cybercriminal is given the opportunity to do as they will with a business? data. These attacks have two factors going in their favor. First, a social engineering attack isn?t the kind of attack that the average user is on the lookout for. They will have instead heard about botnets and ransomware and other big, external threats, and so won?t think to question what seems to be a legitimate-looking message. Secondly, there is plenty of data readily available on the Internet to help build a convincing social engineering attack. This data is referred to as open-source intelligence. Open-source intelligence can come from a vast array of data sources, which only assists an aspiring social engineer. Through some digging on the Internet, a social engineer can find plenty of information that better informs their attack. What the Internet Can ProvideWith the right research, a social engineer can compile an unnervingly comprehensive profile of a business, its employees, its operations, and more. Some very brief and incomplete examples are as follows: TechnologyInformation about the kind of technology a business leverages is surprisingly common online. Job postings, for example, often identify the hardware and operating system a company uses to ensure that an applicant has a familiarity with the systems they would be working with. The trouble is, this also helps a criminal by identifying which exploits will be effective against a company. Furthermore, if a company isn?t careful, their social media images could provide a cybercriminal with information about their networking hardware. Employee InformationIt is also common for people to overshare on social media, which can easily lead to company information being shared as well. This includes, in addition to the access of information many allow to be publicly available via social media, images from within the workplace. Such images often reveal the kind of computer used by employees, as well as the contents of their screens and any information displayed on them. Additionally, many people will discuss their work schedule on social media, as well as provide a detailed account of their professional experience, giving a social engineer more data to work with. Vendors and Other CompaniesExternal services that provide for a company can help a social engineer gain access to that company, especially if the service provider uses them as evidence of value on their website. Janitorial services and trash pickup services are especially valuable, as data could potentially be stolen after it leaves a business? premises. In short, while protecting your data with firewalls, authentication requirements, and other digital measures is crucial, it is just as crucial to also ensure that your employees are aware of the dangers that social engineering can bring. Establishing processes to help thwart social engineering attempts is something that every company should do, as it will help to protect them from these attacks. For help in planning these processes, reach out to White Mountain IT Services at (603) 889-0800.

Tip of the Week: Awareness is Key to Mobile Device Security

AwarenessSince smartphones are able to connect to the Internet via Wi-Fi, and they can connect to other devices over Bluetooth, the utility these devices bring us is actually immense, even if it?s chock full of potential threats. Today?s hackers have begun to target smartphones and other mobile devices through the use of a litany of breach techniques. To ease the risks that come from the growing mobile malware trend, you?ll have to be cognizant of where your Wi-Fi and Bluetooth connections come from. By only connecting to networks that are reliable and secure, you can pretty much use your smartphone as you please, where you please. Your carrier?s cellular signal is encrypted and therefore much more secure than a public connection, including in public charging stations. Another thing that every mobile user has to be cognizant of are the permissions they provide certain applications with. Many applications can demand that you share information with their developers that is completely unnecessary. Being aware of what an application wants can help you know when it is prudent to choose when to use an app, and when to rely on your Internet browser. Considering how important your personal data is, understanding when and why it is being used, and keeping control over it will invariably keep you more secure. SecuritySpeaking of security, there are some security options built-in to your smartphones. No modern day device has as much private information on it as your smartphone. When someone picks up your phone, you obviously don?t want them to have access to everything on it. Users can protect themselves by choosing any number of options that ensure that only authorized parties can get into their smartphone. Most phones come with either options to secure the device with a custom PIN, passcode, or pattern. The new flagships, however, ratchet it up a notch. They provide biometric options through fingerprint readers or facial recognition to secure the contents of a device. By utilizing these security features you can ensure that no one but you gets into your phone without your permission. Since data security should always be a major consideration, especially when you hold data that you personally don?t own, understanding how to insulate that data from others is key. If your business need to improve your mobile device security policies, contact the IT professionals at White Mountain IT Services today at (603) 889-0800.

Strong Internal Communications Can Bring Major Benefits

A Social IntranetWhen we talk about an intranet solution, what we really mean is a unified way of staying connected to your staff and internal resources. You can think of it like a sort-of portal which connects your employees to just about anything that they need access to during the workday. This includes direct connections to online resources, assets, and any important contact information for personnel or services that your company takes advantage of. Some examples of services could include your managed service provider or help desk number. Instant MessagingSometimes there are pressing matters to attend to that can?t wait for a response to an email that could take all day. In cases like this, instant messaging helps you get the signal across that what you?re requesting is urgent and cannot wait. Aside from this, instant messaging is important in that it allows your employees to communicate in a moment?s notice, cutting down on time wasted due to miscommunications during project implementation. Some features to look for in an instant messaging system are the ability to create group chats and private rooms. Internal Blogs and DocumentationYour employees want something to look at that can help them effectively do their jobs. Some companies have internal blogs available through their intranet solutions that explain certain concepts more in-depth for users to examine at their leisure. The same can be said for documentation regarding more complex procedures. This saves your supervisors from spending more time than necessary on training. Discussion BoardsIn much the same way as internal blogs and documentation, discussion boards can be used by your team to brainstorm ideas and engage each other in a less formal environment. This can be in the form of asking open-ended questions regarding workflow or simply getting feedback for an upcoming project. Either way, discussion boards can be used with the intention of making information both more consumable and more accessible. A Ticketing System and Help DeskLet?s say that your company experiences technology issues that your employees don?t necessarily know how to fix. Instead of wasting time trying to get in contact with someone who can help, you could implement a ticketing system put in place by a managed service provider like White Mountain IT Services. You can then have your employees submit a ticket when they need help. The MSP would then respond as per your service level agreement, eliminating the majority of downtime caused by technology troubles. Ultimately, communication and your intranet are going to rely on a collective sharing of knowledge within your organization. Are you ready to implement these types of strategies for your business? Get started by calling us at (603) 889-0800.

IoT Security is a Key Business Concern

What are You Willing to Risk?When devising a policy for your company concerning the IoT, you need to establish what (or how much) you?re willing to leave vulnerable. This has a lot to do with your employees and what they are able to access. The more data an employee has access to, the riskier it is to allow that particular user to utilize the IoT in the office. Likewise, the less data an employee can access, the less of a relative risk it is to allow them to use Internet of Things devices. However, it is important to remember that the term ?relative? is an important one. IoT devices are notorious for their iffy security measures, and so it is important to take many factors into consideration. First of all, how sensitive is the data that a particular employee can access? If they are pretty well separated from any confidential or sensitive data, allowing them to make basic use of the IoT may be a valid option. This may very well depend on the industry that your company serves, as well as the security standards of the company itself. Check what has been outlined in your company?s handbook to ensure that you meet any established security practices. A Well-Trained Staff is a Prepared StaffNaturally, more than one person in any organization needs to be mindful of its security, including (and especially) where the IoT is concerned. It isn?t enough for organizational leadership to campaign for mindful and secure practices. If a business is to be protected against the issues that the IoT still presents, security has to be a team effort. Everyone in an organization has to not only be aware of the risks that the IoT may pose, they need to know and subscribe to the organization?s use policies. Furthermore, it also becomes important for staff members to be able to identify and handle the warning signs of a threat leveraging the IoT. Leading by ExampleFinally, in order to establish a real awareness of IoT risks in the workplace, office leadership needs to take the first steps. By subscribing to the guidelines that are placed upon employees themselves, management can set an example as to how the IoT can be appropriately utilized. Prudence is the key to safely and wisely utilizing the Internet of Things. For more assistance with implementing technology solutions, give White Mountain IT Services a call at (603) 889-0800.

Tip of the Week: Prime Your Business for a Successful 2019

BlockchainThe rise of cryptocurrencies have brought the blockchain into the spotlight, but the abilities of the blockchain that permits cryptocurrencies to function also have applications in the business world. Simply put, blockchain technology allows for information to be secured and protected. Furthermore, business processes can be streamlined and made more secure as well, replacing third parties with smart contracts that are able to confirm actions without exposing data to security risks. Internet of ThingsThe Internet of Things, or the IoT, is already becoming a standby in daily life. Countless devices are able to connect to the Internet as a means of their general function, communicating with other devices and activating processes based on predetermined factors. This allows for tasks to be completed without the risk of user error. However, there are still some concerns about the IoT, namely, a general lack of security incorporated into the devices. As a result, it may be best to simply monitor how the IoT is being improved upon–waiting until its security is up to standards before diving in. With any luck, improving the security of these devices will be a focus during 2019. ChatbotsWhile the importance of maintaining an open line of communication with clients and customers is indisputable, many companies lack the internal resources to dedicate the commitment to comprehensive support. Improvements in chatbot interfaces have made them an increasingly viable option for companies to field incoming messages, as artificial intelligence attends to many concerns and greatly reduces the number of problems that your staff has to deal with. As a result of these improvements, more industries are likely to increase their use of chatbots for a variety of purposes. Subscription ModelThe ability for most solutions to be delivered and maintained via an Internet connection has led to a shift in software deployment. Instead of needing to buy a new version of the software every year, the subscription model allows companies to pay a monthly fee for the security of knowing that the software they are using is the most recent (and secure) version available. AutomationIt should come as no surprise that a technology that allows focus to be shifted from menial tasks to other, more pressing considerations would be welcomed in the business world. Automation permits exactly this, with artificial intelligence and predetermined processes stepping in and providing certain business needs. While there are many processes and fields that still require a human touch, automation allows for more time to be committed to them, and less to ?busy? work. Which of these technologies do you see having the biggest benefit for your business? Let us know in the comments, and make sure you subscribe to our blog!