Social Engineering: 7 Common Red Flags
Most of us believe we now have enough awareness to avoid opening sketchy emails or clicking on dubious links. But the truth is cyber-attacks and phishing scams have become much more sophisticated. Your employees may be immune to requests for money from a Nigerian prince, but are they in tune enough to take a closer look at official looking emails from company vendors and partners, internal employees they regularly communicate with, or from their own personal bank?
What is Social Engineering?
Social engineering is the act of manipulating people into performing actions or divulging confidential information. The term applies to deception for the purpose of gathering information, or computer system access. In many cases, the victim may not even know they granted access to a corrupt third party while leaving the entire company’s system and data vulnerable. This includes the simple acts of clicking on a hyperlink or opening an attachment. In other cases, an email may request you to input information, such as usernames, passwords or account numbers.
How do you know if an email is fake?
It’s important to note that many phishing emails now get by advanced spam filters. All business owners and employees must be diligent in inspecting each part of an email for these social engineering red flags.
Check the email address domain. Hackers will use real business names and add innocuous extra words (Person@nowinsurance-support.com). Or misspell the business name, hoping you won’t notice (firstname.lastname@example.org).
In some cases, the sender can make it look like the email is from someone you know and their real email address. The from line may look like this:
From: “Michael Miller – email@example.com” <firstname.lastname@example.org>
It appears to be from Michael, and your eyes will read his email address first, but in reality, it’s from the scam account email@example.com.
You don’t recognize the senders email address and the email has embedded hyperlinks or attachments.
You recognize the sender but haven’t communicated with this person recently, and the email seems out of the blue.
The email is from someone outside your organization and is unrelated to your job duties.
The email from someone inside your organization, or someone you regularly communicate with (such as a vendor or customer) but the email is unusual or out of character. If something seems off, contact the person in a separate email or by phone. Do not click any links or open any attachments.
The email is sent to an unusual mix of people that don’t seem to have much correlation with each other in terms of job function. You might notice everyone’s last name starts with the same letter or another pattern.
You are cc’d along with other people that you don’t know.
Hover over the hyperlink, but don’t click. Is the link the pops up in the hover box different than the typed one in the email?
There’s a hyperlink in the email but no other content or explanation.
There are misspelled words in the hyperlink.
The email is sent at an unusual time, such as in the middle of the night.
The subject is unrelated to the content in the email.
The subject contains a message that sounds urgent.
The subject is attention grabbing and piques your curiosity.
It’s a reply message (RE:) to something you never sent or requested, and you don’t recognize the content.
The sender asks you specifically to click on a link or open an attachment.
The email has bad grammar or typos. (Although this one is becoming less common as hackers become more sophisticated.)
The content does not make sense coming from that particular sender.
The content feels “click-baity”, as in trying to get you to open something funny or embarrassing.
The content is offering something for free (such as a media download) or says you are winner.
Don’t open anything until you know the email is legitimate!
The attachment doesn’t make sense from that particular sender (remember, the sender could be someone you know) or doesn’t match the content or subject of the email.
The attachment is a different file type than you usually handle. Even PDFs, JPGs and Word documents can contain malware if opened.
Encourage coworkers (and vendors that handle your data) to get in the habit of practicing skepticism when checking email. It takes extra time, but it’s worth it to prevent employee and customer data from falling in the wrong hands.
Every small business should consider Cyber Liability Insurance to have guidance and a safety net when recovering from a cyber-attack. NOW Insurance offers three levels of coverage based on the company’s needs. Get a quote using our quick and simple online cyber application.
Use our free cyber risk assessment tool to gauge your company’s cyber risk and spot vulnerabilities in your system.