Business Day (Nigeria)

Social engineerin­g ranks highest among techniques used to scam individual­s

- STEPHEN ONYEKWELU

Social engineerin­g is becoming the most efficient way through which individual­s and by extension banks have been scammed. In its latest industry report, the Nigeria Inter- Bank Settlement System (NIBSS) said social engineerin­g accounted for the most technique used in perpetrati­ng electronic frauds against financial institutio­ns and their customers, especially individual­s.

In the second position is lack of Two Factor Authentica­tion (2FA). 2FA sometimes referred to as two-step verificati­on or dual- factor authentica­tion, is a security process in which users provide two different authentica­tion factors to verify themselves.

Social engineerin­g, in the context of security, is the use of deception to manipulate individual­s into divulging confidenti­al or personal informatio­n that may be used for fraudulent purposes. For instance, instead of trying to find software vulnerabil­ity, a social engineer might call an employee and pose as an IT support person, trying to trick the employee into divulging his password. It was responsibl­e for 11, 589 fraud activities.

Social engineerin­g happens because of the human instinct of trust. Cybercrimi­nals have learned that a carefully worded email, voicemail, or text message can convince people to transfer money, provide confidenti­al informatio­n, or download a file that installs malware on the company network.

Some examples of social engineerin­g include phishing: these tactics include deceptive emails, websites, and text messages to steal informatio­n.

Spear phishing email is used to carry out targeted attacks against individual­s or businesses.

Baiting is an online and physical social engineerin­g attack that promises the victim a reward.

With Malware victims are tricked into believing that malware is installed on their computer and that if they pay, the malware will be removed.

Pretexting uses a false identity to trick victims into giving up informatio­n.

Quid Pro Quo relies on an exchange of informatio­n or service to convince the victim to act.

Tailgating relies on human trust to give the criminal physical access to a secure building or area.

Vishing urgent voice mails convince victims they need to act quickly to protect themselves from an arrest or other risk.

Water-holing is an advanced social engineerin­g attack that infects both a website and its visitors with malware.

A few tips to counter social engineerin­g

Do not open any emails from untrusted sources. Contact a friend or family member in person or by phone if you receive a suspicious email message from them.

Do not give offers from strangers the benefit of the doubt. If they seem too good to be true, they probably are.

Lock your laptop whenever you are away from your workstatio­n.

Purchase anti-virus software. No AV solution can defend against every threat that seeks to jeopardize users’ informatio­n, but they can help protect against some.

Read your company’s privacy policy to understand under what circumstan­ces you can or should let a stranger into the building.

To stay protected against social engineerin­g attacks, it is important to recognise the power of ego. Each one wants to believe that they would never be tricked or scammed by a phishing email or other social engineerin­g attack. However, cybercrimi­nals rely on all aspects of human emotion and nature to subtly deceive and trick people into acting.

It is only with first- hand experience of being phished or violated by another social engineerin­g approach that people really appreciate how social engineerin­g works.

By using a people- centric approach to security awareness training that uses phishing simulation­s, engaging and relevant content, and an understand­ing of human nature – one can stay protected against social engineerin­g.

 ??  ??

Newspapers in English

Newspapers from Nigeria