Hollywood has conditioned us to believe that hacking is a thrilling, high-stakes crime full of frenzied typing, loud sirens, and – for some reason – yelling (so much yelling). Who can forget the infamous NCIS episode involving Abby’s computer being hacked, and the very effective method of not one, but two characters pounding on a keyboard to thwart said hacking? (It is truly Emmy Award-winning material.)
In real life, however, hacking is typically far less dramatic and can be done in much simpler ways, without even using software. We have so much personal information online that hackers can use this to gain confidential information about you easily.
Social engineering is the art of gaining access to buildings, systems, or data by exploiting human psychology. A hacker could try to gain access to data by finding a system flaw, but it’s much easier to contact an employee, pose as an IT technician, and get that employee to provide their password.
And how do these social engineers even find out where you work? Hackers take advantage of sources like LinkedIn, social media accounts, and company websites to learn all about you, and then call or send a phishing campaign to extract information, like financial and personal data.
We’re not suggesting you shut down your LinkedIn account! However, there are certain things you can look out for to circumvent social engineers:
The most important thing to remember is that social engineers will use information about you to gain your trust. You should always be suspicious of unsolicited emails, texts, phone calls, and even physical mail phishing for more details about you. Additional information on phishing scams can be found on our website at phish.weill.cornell.edu.
October is National Cyber Security Awareness Month, an annual collaborative effort between government and industry to ensure we have the resources you need to maintain your security online. Throughout October, we’ll be sending you tips on protecting your information and avoiding malicious attempts to extract your personal data. See our past tips here.