MSP Blog Logo

BDR

Business Growth

Cybersecurity

Help Desk

MDM

RMM

Sales & Marketing

Subscribe

Empowering Your MSP Business to Grow and Prosper—One Post at a Time

5 Ways to Improve Your MSP Service Level Agreement (SLA)

Featured Post

5 Ways to Improve Your MSP Service Level Agreements (SLAs)

SLAs are the foundation of your MSP business. They are essential to building strong client relationships and must be clear, reasonable and well-constructed.

Read Now

Breaking Down the Dangers of Social Engineering

Posted March 24, 2017by Lily Teplow

Breaking Down the Dangers of Social-Engineering

By now, we’re all familiar with the type of hacker who uses their technical skills to infiltrate computer systems and compromise sensitive data. It’s seen in news headlines across the globe today. However, there’s now another type of hacker who uses special tactics to exploit the one weakness that every organization has: human psychology.

This is more commonly known as social engineering, which is the art of manipulating people so they give up confidential information. Not only are social engineering attacks becoming more common against small- and medium-sized businesses (SMBs), they’re also becoming more sophisticated. This makes things very tough for the MSPs that aim to serve and protect those SMB clients. So, in order to stay a few steps ahead of cybercriminals, here’s what you should know about social engineering attacks and how MSPs can help prevent clients from falling victim to them.

What Does Social Engineering Look Like Today?

As businesses start to adopt more effective strategies to preventing viruses and malware, attackers are shifting their approach to trick victims through more sophisticated techniques like social engineering. The most dangerous aspect of this is how attackers manipulate victims with offers or threats, fooling otherwise unsuspecting users or employees into handing over confidential or sensitive data.

Typically, social engineering involves email or other communication that invokes urgency, fear or similar emotions in the victim that leads them to take prompt action. It could be an email that looks like it’s coming from a credible organization, such as your mail service or bank. But if you open it and click on that attachment, you could be installing malware or ransomware! Or, it could be disguised to seem like it’s coming from someone inside your company, such as an IT department or a CEO, but if you respond to that email with your user name and password, your computer is easily compromised.

Because social engineering involves a human element, preventing these attacks can be very tricky for businesses today. As their MSP, what should you be on the lookout for? Here are a few common forms of social engineering attacks to be weary of:

Phishing and spear phishing

About 91 percent of data breaches come from phishing, which is why it’s become one of the most exploited forms of social engineering. A phishing email is carefully crafted to look as though it’s coming from a trusted source, but attackers are actually behind the scenes trying to trick victims into downloading an attachment, clicking on a malicious link or providing sensitive information. General phishing emails can be sent to an entire organization, whereas spear phishing emails are crafted specifically for a few people in an organization that could have valuable information for an attacker. These types of attacks will usually vary with current events, disasters or tax season.

Speaking of which, authorities have already warned us about a massive wave of W-2 tax form phishing scams. How do these scams work exactly? Cyber criminals are sending emails that look like they come from the CEO, or another C-level executive, and ask for a PDF with the W-2 tax information of all employees. The W-2's have all the information needed to file fraudulent tax returns and steal anyone's identity, which goes to show that attackers will stop at nothing to steal sensitive information.

Vishing (voice phishing)

Vishing is essentially the same as phishing, just over the phone. After finding a bit of information about a victim (such as a name or date of birth), a criminal will call them – oftentimes disguised as tech or customer support – to trick them into divulging more information, login credentials or even a social security number. This type of attack can also be used to target organizations. Attackers will often hide behind a specific area code or caller ID in order to trick the person on the other end to give up company information including hours of operations, financial or employee information, and even password resets.

Baiting

Just as the term suggests, baiting attacks involve offering victims something they are searching for or want. These types of attacks often appear on peer-to-peer sharing sites where you can download and stream music, or those Oscar-winning movies you’ve been meaning to see. The risk is that you might actually be downloading malware instead of the files you were hoping for. Baiting can also include too-good-to-be-true online deals or fake emails offering free coupons.

How Can Social Engineering Attacks Be Prevented?

Educate

The most important thing you can do as an MSP is provide your clients with cybersecurity education and awareness. This is essential, specifically when it comes to social engineering because attacks can be stopped by the target themselves. They need to know what to look out for when receiving email, phone calls or clicking on links, and you can be their primary resource. When you teach employees how to protect their company’s confidential data, you allow them to become more vigilant and a much-needed security layer.

Monitor and secure devices

With an increasingly mobile workforce and threats coming through both personal and professional devices, businesses need multi-layered endpoint security now more than ever. Today, security needs to be built from the endpoint outwards, and that all starts with a reliable remote monitoring and management (RMM) solution. By offering an RMM solution that’s coupled with antivirus software, MSPs can be more proactive in preventing social engineering and other cyber attacks from occurring. Additionally, when RMM is combined with a network infrastructure tool, it allows for a more complete view of your clients systems, so you can monitor the health of their IT infrastructure and mitigate any risks that arise.

The best way to combat social engineering attempts is to never let them infect you to begin with. Now, this might be easier said than done, but having reliable RMM and endpoint security (combined with the education piece I mentioned earlier) are essential in making this possible.

Back up

As an MSP, you know too well that human error is a way of the industry. No matter how much security training or services you provide, people will still fall for scams or click on links they shouldn’t click on. Because of this, it’s vital for businesses to have a backup and disaster recovery (BDR) solution in place. In case files become encrypted or devices become compromised, having BDR will ensure that your clients have reliable and recent backups and that their essential data can be restored to an undamaged state with as little downtime or data loss as possible.

Handpicked for you:
Get-Cybersecurity-Tips-for-Employees-The-Complete-Guide-to-Secure-Behavior-Online-and-in-the-Office-eBook

Meet Lily Teplow! After majoring in Communications and French, Lily graduated from South Carolina's Furman University and now takes on her new role as Content Marketing Associate and Blog Manager at Continuum. In her spare time, Lily enjoys singing, traveling, and cheering on her favorite Boston sports teams!

RMM 101: Must-haves for Your IT Management Solution
MSP Guide to Managed Services SLAs  [white paper]
comments powered by Disqus