Social Engineering: The REAL Security Threat

Social Engineering: The REAL Security Threat

If you’re not familiar with the term “Social Engineering” you need to take a moment to familiarize yourself with it.

Social Engineering is a fancy way of referring to one of many confidence schemes by which a fraudster tries to get a mark to give up secure information like usernames, passwords, physical access to sensitive information or networks, etc.  Social Engineering takes a number of forms such as impersonation, pretexting (relationship building) and extortion.

Often times people perceive the threat to information security to be seated in the hardware or software on their PC, laptop or smartphone.  Whereas it is important to have proper protections in place for those physical risks (like firewalls, anti-malware software, etc.), it is equally, if not more important to make sure that you are educated about the risk of Social Engineering.  The best anti-virus software you could imagine can’t protect you from a criminal being granted access to your network, workstation, smartphone or sensitive information.

The article that the link below will take you to has 4 very good examples of Social Engineering threats that are prevalent right now.  At Foundation Title, we engage in monthly security training with regular bulletins and updates about these and other security matters.  We also try to share this knowledge with our clients, customers, and industry partners as often as possible.

CLICK HERE TO SEE THE ARTICLE ON 4 SOCIAL ENGINEERING THREATS

If you have any questions about this topic or anything else, you can email me at support@ftnj.com.

Peter Casey Wall
Director of Technology and Compliance

Get In Touch

Please send us your questions and comments. One of our team members will respond to you in a timely fashion.