Intersys Logo
Menu

Managed IT Support

A Reasonable, Fixed Monthly Fee for All Your IT Needs
Managed IT Support Provider

Consulting Services

The High Level IT Consulting Services You Need to Transform Your Business
Get IT Consulting Services

Cyber Security

A Comprehensive Range of Cyber Security Services for Robust, Industry-Leading Protection
Get Cyber Security Services

IT Solutions

Whatever your IT needs, we'll create a tailormade solution for you
Get IT Solutions

Do you REALLY need to โ€˜know your porn nameโ€™? 5 ways social hacking is targeting your employees and threatening your business

You may have top-notch security tools and a comprehensive cybersecurity plan, but if your employees donโ€™t understand how social hacking works, they may be inadvertently giving away information that opens a back door into your organisation.

 Social hackingโ€‰โ€”โ€‰also known as social engineeringโ€‰โ€”โ€‰is the practice of convincing people to give up confidential information such as bank details or passwords. In its earlier, clumsier phase it often came in the form of badly misspelled emails encouraging you to hand over your credit card information. These days, social hacking is much more sophisticated, and hackers often gather breadcrumbs of information from several sources which they put together to thwart security protocols used by banks and employers.

Whatโ€™s worse is that many of us are helping hackers by voluntarily oversharing information publicly via social media.

Here are some of the most common ways that we enable social hacking through our social media habits.

Joining in viral quizzes and games 

Weโ€™ve all seen them on Facebook or Twitter, and some of us may have joined in the โ€˜funโ€™. Itโ€™s some variation of your porn star name is your middle name and the street you grew up on. Or your porn star name is the name of your first pet and the name of your first school. They may seem like a funโ€‰โ€”โ€‰if sillyโ€‰โ€”โ€‰distraction, but theyโ€™re actually designed to get you to share information that helps hackers get into your online accounts. They work because they seem like an innocuous game, so itโ€™s easy to let down your guard, especially if several of your friends are playing along. 

The details you reveal when you share your motherโ€™s maiden name or the town where you met your spouse help hackers guess your password or give them the answers to common security questions. And as many people reuse passwords across different accounts, hackers will try them across different websites.

Failing to use privacy settings on your social media accounts

Does your Facebook profile really need to be available to everyone? Hackers can find out an awful lot about you. All those friends wishing you a happy birthday just revealed your date of birth (or most of it). Have you listed your hometown in the โ€˜aboutโ€™ section? Perhaps you like to share photos of your pets or children and their names. Regularly check your privacy settings to ensure that you are only sharing sensitive information with people you actually know.

Sharing workplace photos

During the work-from-home phase of the pandemic, many people shared photos of their home office set-up. While most of these photos were harmless, some included their open computer screen, tabs, zoom meetings and post-it notes, potentially sharing things such as the names or email addresses of their colleagues. This is exactly the sort of information that enables hackers to impersonate a co-worker.

The same goes for photos taken in the workplace. Ensure that youโ€™re not unintentionally exposing confidential information. 

Announcing to the world that you have a new job

We get it. Youโ€™ve just got the job of your dreams or a promotion and you want the world to know. But youโ€™ve also just announced the name of your company or organisation and the fact that youโ€™re new and almost certainly donโ€™t know everyone who works there. This, together with the fact that new employees are usually eager to please, makes you an ideal phishing target for a hacker pretending to be a co-worker.

Falling for employment scams

One particularly unpleasant phishing scam involves fake โ€˜recruitersโ€™ contacting job seekers about a position theyโ€™re โ€˜perfectโ€™ for. They then collect information (such as name, address, age, phone number, employment history) for the job application which they use to to steal their identity or gain access to their contacts. This is particularly a problem with LinkedIn, where being a first degree contact of someone gives the hacker some legitimacy. 

Keeping employees off social media is impossible. But ensuring that employees are educated about the dangers of oversharing on social media can help mitigate the risk of identity theft or phishing. To find out how we can help with ensuring your workers are security conscious, visit our Security Operations Centre page and contact us for an informal no-obligation chat.

Intersys offers a security operations centre service for organisations of all sizes. Choose from the Silver, Gold and Platinum packages to get rock-solid protection from an industry specialist in IT security. Prices are scalable and cost far less than you might think. Find out more about SOC as a service from Intersys, or get in touch now and tell us about your requirements.

Stay up to date with IT Industry news

Subscribe to our newsletter

Please enable JavaScript in your browser to complete this form.

Subscribe to our newsletter

Please enable JavaScript in your browser to complete this form.

In other news

December 4, 2023

A Haven of Hope

linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram