SlideShare a Scribd company logo
1 of 12
Don’t Fall Victim to
Social Engineering Traps
Social Engineering
The lowest form of hacking by causing users to perform actions
or divulge confidential information.
1-855-AVENTIS | AventisSystems.com
Human-based traps require person-to-person contact
 Impersonation
 Shoulder Surfing
 Dumpster Diving
1-855-AVENTIS | AventisSystems.com
Human-Based Traps
Gaining access to a network by posing as someone with
authority
1-855-AVENTIS | AventisSystems.com
Impersonation
Gaining information by looking over someone’s shoulder
1-855-AVENTIS | AventisSystems.com
Shoulder Surfing
Gaining access to sensitive information on paper that has been
thrown away
1-855-AVENTIS | AventisSystems.com
Dumpster Diving
 Attacker leaves a piece of media in a place to be found
 Labels media with something intriguing
 Someone plugs it in to see what is on it
 Malware is immediately installed
1-855-AVENTIS | AventisSystems.com
Computer-Based: Baiting
Ensure employees are properly trained
 Keep passwords private
 Never write down passwords
 Never open emails that are not verified
 Never install unknown media
1-855-AVENTIS | AventisSystems.com
Ways to Protect Yourself
Let Us Help You
1-855-AVENTIS | AventisSystems.com
Advanced IT Services - Network & Security Solutions
● http://www.aventissystems.com/Network-and-Security-Solutions-s/8262.htm
Hover & Click
Sign Up
1-855-AVENTIS | AventisSystems.com
www.AventisSystems.com
Follow Us
1-855-AVENTIS | AventisSystems.com
@AventisSystems
1-855-AVENTIS | AventisSystems.com
Thank You!

More Related Content

What's hot

14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awarenessMichel Bitter
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetystrifman
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityJFashant
 
Fantastic Beasts and where to hide from them
Fantastic Beasts and where to hide from themFantastic Beasts and where to hide from them
Fantastic Beasts and where to hide from themVlad Styran
 
Internet Safety Evening Presentation
Internet Safety Evening PresentationInternet Safety Evening Presentation
Internet Safety Evening PresentationAndy Colley
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteDOFJLCCDD
 
Cyber pledge infoMagnum
Cyber pledge infoMagnumCyber pledge infoMagnum
Cyber pledge infoMagnumARUN REDDY M
 
Why i choose information system and osint learning
Why i choose information system and osint learningWhy i choose information system and osint learning
Why i choose information system and osint learningLaurensius Jeffrey Chandra
 
Data Breach: The first 24 hours
Data Breach: The first 24 hours Data Breach: The first 24 hours
Data Breach: The first 24 hours Chris Pace
 
The Corporate Web Security Landscape
The Corporate Web Security LandscapeThe Corporate Web Security Landscape
The Corporate Web Security LandscapePeter Wood
 
KISSPatent open source presentation
KISSPatent open source presentationKISSPatent open source presentation
KISSPatent open source presentationKISSPatent
 
When headlines become stressful
When headlines become stressfulWhen headlines become stressful
When headlines become stressfulkevin_donovan
 

What's hot (20)

Computer safety
Computer safetyComputer safety
Computer safety
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Hacking
HackingHacking
Hacking
 
Computer security
Computer securityComputer security
Computer security
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
SECURITY AWARENESS
SECURITY AWARENESSSECURITY AWARENESS
SECURITY AWARENESS
 
Fantastic Beasts and where to hide from them
Fantastic Beasts and where to hide from themFantastic Beasts and where to hide from them
Fantastic Beasts and where to hide from them
 
Internet Safety Evening Presentation
Internet Safety Evening PresentationInternet Safety Evening Presentation
Internet Safety Evening Presentation
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and Etiquette
 
Cyber pledge infoMagnum
Cyber pledge infoMagnumCyber pledge infoMagnum
Cyber pledge infoMagnum
 
Why i choose information system and osint learning
Why i choose information system and osint learningWhy i choose information system and osint learning
Why i choose information system and osint learning
 
Data Breach: The first 24 hours
Data Breach: The first 24 hours Data Breach: The first 24 hours
Data Breach: The first 24 hours
 
Web app security essentials
Web app security essentialsWeb app security essentials
Web app security essentials
 
The Corporate Web Security Landscape
The Corporate Web Security LandscapeThe Corporate Web Security Landscape
The Corporate Web Security Landscape
 
KISSPatent open source presentation
KISSPatent open source presentationKISSPatent open source presentation
KISSPatent open source presentation
 
New internet
New internetNew internet
New internet
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Internet safety
Internet safetyInternet safety
Internet safety
 
When headlines become stressful
When headlines become stressfulWhen headlines become stressful
When headlines become stressful
 

Similar to Don’t Fall Victim to Social Engineering Traps

1-Domain ComTIA Security+.pdf
1-Domain ComTIA Security+.pdf1-Domain ComTIA Security+.pdf
1-Domain ComTIA Security+.pdfShamsherkhan36
 
Invincea Dell Protected Workspace blocks Spear-Phish Word-doc-Mar-2014
Invincea Dell Protected Workspace blocks Spear-Phish Word-doc-Mar-2014Invincea Dell Protected Workspace blocks Spear-Phish Word-doc-Mar-2014
Invincea Dell Protected Workspace blocks Spear-Phish Word-doc-Mar-2014Invincea, Inc.
 
Invincea Dell Protected Workspace blocks Spear-Phish Word-doc-Mar-2014
Invincea Dell Protected Workspace blocks Spear-Phish Word-doc-Mar-2014Invincea Dell Protected Workspace blocks Spear-Phish Word-doc-Mar-2014
Invincea Dell Protected Workspace blocks Spear-Phish Word-doc-Mar-2014Invincea, Inc.
 
Basic Security Chapter 1
Basic Security Chapter 1Basic Security Chapter 1
Basic Security Chapter 1AfiqEfendy Zaen
 
Basic security concepts_chapter_1
Basic security concepts_chapter_1Basic security concepts_chapter_1
Basic security concepts_chapter_1abdifatah said
 
Cybersecurity Cyber Usalama
Cybersecurity Cyber UsalamaCybersecurity Cyber Usalama
Cybersecurity Cyber UsalamaMuhammadRadwan10
 
2016 ISACA NACACS - Audit As An Impact Player For Cybersecurity
2016 ISACA NACACS - Audit As An Impact Player For Cybersecurity2016 ISACA NACACS - Audit As An Impact Player For Cybersecurity
2016 ISACA NACACS - Audit As An Impact Player For CybersecurityNathan Anderson
 
IT Threats and Computer Security
IT Threats and Computer SecurityIT Threats and Computer Security
IT Threats and Computer SecurityKongChunLeong1
 
EN-Ethical-Hacking-2023-18-08-03-26-15.pdf
EN-Ethical-Hacking-2023-18-08-03-26-15.pdfEN-Ethical-Hacking-2023-18-08-03-26-15.pdf
EN-Ethical-Hacking-2023-18-08-03-26-15.pdfssuser886cfe
 
EN-Ethical Hacking.pdf
EN-Ethical Hacking.pdfEN-Ethical Hacking.pdf
EN-Ethical Hacking.pdfVinay379568
 
certifieced ethical hacker course old an
certifieced ethical hacker course old ancertifieced ethical hacker course old an
certifieced ethical hacker course old anradio02moura
 
Social Engineering Basics
Social Engineering BasicsSocial Engineering Basics
Social Engineering BasicsLuke Rusten
 
How to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware AttacksHow to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware AttacksSolarwinds N-able
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityNcell
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hackingparag101
 
Information Security & Ethical Hacking
Information Security & Ethical HackingInformation Security & Ethical Hacking
Information Security & Ethical HackingIshan Agarwal
 
Invincea fake british airways ticket spear-phish malware 03-21-2014
Invincea fake british airways ticket spear-phish malware 03-21-2014Invincea fake british airways ticket spear-phish malware 03-21-2014
Invincea fake british airways ticket spear-phish malware 03-21-2014Invincea, Inc.
 
Invincea fake british airways ticket spear-phish malware 03-21-2014
Invincea fake british airways ticket spear-phish malware 03-21-2014Invincea fake british airways ticket spear-phish malware 03-21-2014
Invincea fake british airways ticket spear-phish malware 03-21-2014Invincea, Inc.
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingdjkhatri
 

Similar to Don’t Fall Victim to Social Engineering Traps (20)

1-Domain ComTIA Security+.pdf
1-Domain ComTIA Security+.pdf1-Domain ComTIA Security+.pdf
1-Domain ComTIA Security+.pdf
 
Invincea Dell Protected Workspace blocks Spear-Phish Word-doc-Mar-2014
Invincea Dell Protected Workspace blocks Spear-Phish Word-doc-Mar-2014Invincea Dell Protected Workspace blocks Spear-Phish Word-doc-Mar-2014
Invincea Dell Protected Workspace blocks Spear-Phish Word-doc-Mar-2014
 
Invincea Dell Protected Workspace blocks Spear-Phish Word-doc-Mar-2014
Invincea Dell Protected Workspace blocks Spear-Phish Word-doc-Mar-2014Invincea Dell Protected Workspace blocks Spear-Phish Word-doc-Mar-2014
Invincea Dell Protected Workspace blocks Spear-Phish Word-doc-Mar-2014
 
Basic Security Chapter 1
Basic Security Chapter 1Basic Security Chapter 1
Basic Security Chapter 1
 
Basic security concepts_chapter_1
Basic security concepts_chapter_1Basic security concepts_chapter_1
Basic security concepts_chapter_1
 
Cybersecurity Cyber Usalama
Cybersecurity Cyber UsalamaCybersecurity Cyber Usalama
Cybersecurity Cyber Usalama
 
2016 ISACA NACACS - Audit As An Impact Player For Cybersecurity
2016 ISACA NACACS - Audit As An Impact Player For Cybersecurity2016 ISACA NACACS - Audit As An Impact Player For Cybersecurity
2016 ISACA NACACS - Audit As An Impact Player For Cybersecurity
 
IT Threats and Computer Security
IT Threats and Computer SecurityIT Threats and Computer Security
IT Threats and Computer Security
 
EN-Ethical-Hacking-2023-18-08-03-26-15.pdf
EN-Ethical-Hacking-2023-18-08-03-26-15.pdfEN-Ethical-Hacking-2023-18-08-03-26-15.pdf
EN-Ethical-Hacking-2023-18-08-03-26-15.pdf
 
EN-Ethical Hacking.pdf
EN-Ethical Hacking.pdfEN-Ethical Hacking.pdf
EN-Ethical Hacking.pdf
 
certifieced ethical hacker course old an
certifieced ethical hacker course old ancertifieced ethical hacker course old an
certifieced ethical hacker course old an
 
Social Engineering Basics
Social Engineering BasicsSocial Engineering Basics
Social Engineering Basics
 
How to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware AttacksHow to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware Attacks
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Hacking and Anti Hacking
Hacking and Anti HackingHacking and Anti Hacking
Hacking and Anti Hacking
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
Information Security & Ethical Hacking
Information Security & Ethical HackingInformation Security & Ethical Hacking
Information Security & Ethical Hacking
 
Invincea fake british airways ticket spear-phish malware 03-21-2014
Invincea fake british airways ticket spear-phish malware 03-21-2014Invincea fake british airways ticket spear-phish malware 03-21-2014
Invincea fake british airways ticket spear-phish malware 03-21-2014
 
Invincea fake british airways ticket spear-phish malware 03-21-2014
Invincea fake british airways ticket spear-phish malware 03-21-2014Invincea fake british airways ticket spear-phish malware 03-21-2014
Invincea fake british airways ticket spear-phish malware 03-21-2014
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

More from Aventis Systems, Inc.

Remote Desktop Services - Who Needs It?
Remote Desktop Services - Who Needs It?Remote Desktop Services - Who Needs It?
Remote Desktop Services - Who Needs It?Aventis Systems, Inc.
 
The Importance of Endpoint Protection - Featuring SEP 14
The Importance of Endpoint Protection - Featuring SEP 14The Importance of Endpoint Protection - Featuring SEP 14
The Importance of Endpoint Protection - Featuring SEP 14Aventis Systems, Inc.
 
Keep Your Data Safe & Backup Like a Pro [from Live Webinar on 1-18-17]
Keep Your Data Safe & Backup Like a Pro [from Live Webinar on 1-18-17]Keep Your Data Safe & Backup Like a Pro [from Live Webinar on 1-18-17]
Keep Your Data Safe & Backup Like a Pro [from Live Webinar on 1-18-17]Aventis Systems, Inc.
 
The Case for SSDs - Market Domination & Why You Need Them in Your Environment
The Case for SSDs - Market Domination & Why You Need Them in Your EnvironmentThe Case for SSDs - Market Domination & Why You Need Them in Your Environment
The Case for SSDs - Market Domination & Why You Need Them in Your EnvironmentAventis Systems, Inc.
 
Benefits of Upgrading to Windows 10 in the Government Sector
Benefits of Upgrading to Windows 10 in the Government SectorBenefits of Upgrading to Windows 10 in the Government Sector
Benefits of Upgrading to Windows 10 in the Government SectorAventis Systems, Inc.
 
Why Government Agencies Should Consider Dell 13th Gen Servers
Why Government Agencies Should Consider Dell 13th Gen ServersWhy Government Agencies Should Consider Dell 13th Gen Servers
Why Government Agencies Should Consider Dell 13th Gen ServersAventis Systems, Inc.
 
Tech Spec Roundup - All-in-One Desktop PCs
Tech Spec Roundup - All-in-One Desktop PCsTech Spec Roundup - All-in-One Desktop PCs
Tech Spec Roundup - All-in-One Desktop PCsAventis Systems, Inc.
 
SMB Benefits of VPS Solutions - Availability, Security, and Support
SMB Benefits of VPS Solutions - Availability, Security, and SupportSMB Benefits of VPS Solutions - Availability, Security, and Support
SMB Benefits of VPS Solutions - Availability, Security, and SupportAventis Systems, Inc.
 
Attaching Storage to Blade Infrastructure
Attaching Storage to Blade InfrastructureAttaching Storage to Blade Infrastructure
Attaching Storage to Blade InfrastructureAventis Systems, Inc.
 
Out-of-Band Management - Why Standard Doesn’t Cut It
Out-of-Band Management - Why Standard Doesn’t Cut ItOut-of-Band Management - Why Standard Doesn’t Cut It
Out-of-Band Management - Why Standard Doesn’t Cut ItAventis Systems, Inc.
 
Government IT Budgets: Spend Now to Save Later
Government IT Budgets: Spend Now to Save LaterGovernment IT Budgets: Spend Now to Save Later
Government IT Budgets: Spend Now to Save LaterAventis Systems, Inc.
 
Product Spotlight: Red Hat Enterprise Linux for Servers and Desktops
Product Spotlight: Red Hat Enterprise Linux for Servers and DesktopsProduct Spotlight: Red Hat Enterprise Linux for Servers and Desktops
Product Spotlight: Red Hat Enterprise Linux for Servers and DesktopsAventis Systems, Inc.
 
Answers to Your IT Nightmares - SAS, iSCSI, or Fibre Channel?
Answers to Your IT Nightmares - SAS, iSCSI, or Fibre Channel?Answers to Your IT Nightmares - SAS, iSCSI, or Fibre Channel?
Answers to Your IT Nightmares - SAS, iSCSI, or Fibre Channel?Aventis Systems, Inc.
 
Answers to Your IT Nightmares - Windows Server 2003 to 2012 R2 Upgrade Best P...
Answers to Your IT Nightmares - Windows Server 2003 to 2012 R2 Upgrade Best P...Answers to Your IT Nightmares - Windows Server 2003 to 2012 R2 Upgrade Best P...
Answers to Your IT Nightmares - Windows Server 2003 to 2012 R2 Upgrade Best P...Aventis Systems, Inc.
 
RIP SQL Server 2005 - Time to Move On!
RIP SQL Server 2005 - Time to Move On!RIP SQL Server 2005 - Time to Move On!
RIP SQL Server 2005 - Time to Move On!Aventis Systems, Inc.
 
What to Do with Your Used IT Hardware
What to Do with Your Used IT HardwareWhat to Do with Your Used IT Hardware
What to Do with Your Used IT HardwareAventis Systems, Inc.
 
Networking Considerations for IT Labs
Networking Considerations for IT LabsNetworking Considerations for IT Labs
Networking Considerations for IT LabsAventis Systems, Inc.
 
Don’t Get Caught by Phishing Emails!
Don’t Get Caught by Phishing Emails!Don’t Get Caught by Phishing Emails!
Don’t Get Caught by Phishing Emails!Aventis Systems, Inc.
 

More from Aventis Systems, Inc. (20)

Remote Desktop Services - Who Needs It?
Remote Desktop Services - Who Needs It?Remote Desktop Services - Who Needs It?
Remote Desktop Services - Who Needs It?
 
The Importance of Endpoint Protection - Featuring SEP 14
The Importance of Endpoint Protection - Featuring SEP 14The Importance of Endpoint Protection - Featuring SEP 14
The Importance of Endpoint Protection - Featuring SEP 14
 
Keep Your Data Safe & Backup Like a Pro [from Live Webinar on 1-18-17]
Keep Your Data Safe & Backup Like a Pro [from Live Webinar on 1-18-17]Keep Your Data Safe & Backup Like a Pro [from Live Webinar on 1-18-17]
Keep Your Data Safe & Backup Like a Pro [from Live Webinar on 1-18-17]
 
Windows Server 2016 Licensing Tips
Windows Server 2016 Licensing TipsWindows Server 2016 Licensing Tips
Windows Server 2016 Licensing Tips
 
The Case for SSDs - Market Domination & Why You Need Them in Your Environment
The Case for SSDs - Market Domination & Why You Need Them in Your EnvironmentThe Case for SSDs - Market Domination & Why You Need Them in Your Environment
The Case for SSDs - Market Domination & Why You Need Them in Your Environment
 
Benefits of Upgrading to Windows 10 in the Government Sector
Benefits of Upgrading to Windows 10 in the Government SectorBenefits of Upgrading to Windows 10 in the Government Sector
Benefits of Upgrading to Windows 10 in the Government Sector
 
Why Government Agencies Should Consider Dell 13th Gen Servers
Why Government Agencies Should Consider Dell 13th Gen ServersWhy Government Agencies Should Consider Dell 13th Gen Servers
Why Government Agencies Should Consider Dell 13th Gen Servers
 
Tech Spec Roundup - All-in-One Desktop PCs
Tech Spec Roundup - All-in-One Desktop PCsTech Spec Roundup - All-in-One Desktop PCs
Tech Spec Roundup - All-in-One Desktop PCs
 
SMB Benefits of VPS Solutions - Availability, Security, and Support
SMB Benefits of VPS Solutions - Availability, Security, and SupportSMB Benefits of VPS Solutions - Availability, Security, and Support
SMB Benefits of VPS Solutions - Availability, Security, and Support
 
Attaching Storage to Blade Infrastructure
Attaching Storage to Blade InfrastructureAttaching Storage to Blade Infrastructure
Attaching Storage to Blade Infrastructure
 
Out-of-Band Management - Why Standard Doesn’t Cut It
Out-of-Band Management - Why Standard Doesn’t Cut ItOut-of-Band Management - Why Standard Doesn’t Cut It
Out-of-Band Management - Why Standard Doesn’t Cut It
 
Government IT Budgets: Spend Now to Save Later
Government IT Budgets: Spend Now to Save LaterGovernment IT Budgets: Spend Now to Save Later
Government IT Budgets: Spend Now to Save Later
 
Veeam Backup Essentials v9 Overview
Veeam Backup Essentials v9 OverviewVeeam Backup Essentials v9 Overview
Veeam Backup Essentials v9 Overview
 
Product Spotlight: Red Hat Enterprise Linux for Servers and Desktops
Product Spotlight: Red Hat Enterprise Linux for Servers and DesktopsProduct Spotlight: Red Hat Enterprise Linux for Servers and Desktops
Product Spotlight: Red Hat Enterprise Linux for Servers and Desktops
 
Answers to Your IT Nightmares - SAS, iSCSI, or Fibre Channel?
Answers to Your IT Nightmares - SAS, iSCSI, or Fibre Channel?Answers to Your IT Nightmares - SAS, iSCSI, or Fibre Channel?
Answers to Your IT Nightmares - SAS, iSCSI, or Fibre Channel?
 
Answers to Your IT Nightmares - Windows Server 2003 to 2012 R2 Upgrade Best P...
Answers to Your IT Nightmares - Windows Server 2003 to 2012 R2 Upgrade Best P...Answers to Your IT Nightmares - Windows Server 2003 to 2012 R2 Upgrade Best P...
Answers to Your IT Nightmares - Windows Server 2003 to 2012 R2 Upgrade Best P...
 
RIP SQL Server 2005 - Time to Move On!
RIP SQL Server 2005 - Time to Move On!RIP SQL Server 2005 - Time to Move On!
RIP SQL Server 2005 - Time to Move On!
 
What to Do with Your Used IT Hardware
What to Do with Your Used IT HardwareWhat to Do with Your Used IT Hardware
What to Do with Your Used IT Hardware
 
Networking Considerations for IT Labs
Networking Considerations for IT LabsNetworking Considerations for IT Labs
Networking Considerations for IT Labs
 
Don’t Get Caught by Phishing Emails!
Don’t Get Caught by Phishing Emails!Don’t Get Caught by Phishing Emails!
Don’t Get Caught by Phishing Emails!
 

Recently uploaded

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 

Recently uploaded (20)

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 

Don’t Fall Victim to Social Engineering Traps

  • 1. Don’t Fall Victim to Social Engineering Traps
  • 2. Social Engineering The lowest form of hacking by causing users to perform actions or divulge confidential information. 1-855-AVENTIS | AventisSystems.com
  • 3. Human-based traps require person-to-person contact  Impersonation  Shoulder Surfing  Dumpster Diving 1-855-AVENTIS | AventisSystems.com Human-Based Traps
  • 4. Gaining access to a network by posing as someone with authority 1-855-AVENTIS | AventisSystems.com Impersonation
  • 5. Gaining information by looking over someone’s shoulder 1-855-AVENTIS | AventisSystems.com Shoulder Surfing
  • 6. Gaining access to sensitive information on paper that has been thrown away 1-855-AVENTIS | AventisSystems.com Dumpster Diving
  • 7.  Attacker leaves a piece of media in a place to be found  Labels media with something intriguing  Someone plugs it in to see what is on it  Malware is immediately installed 1-855-AVENTIS | AventisSystems.com Computer-Based: Baiting
  • 8. Ensure employees are properly trained  Keep passwords private  Never write down passwords  Never open emails that are not verified  Never install unknown media 1-855-AVENTIS | AventisSystems.com Ways to Protect Yourself
  • 9. Let Us Help You 1-855-AVENTIS | AventisSystems.com Advanced IT Services - Network & Security Solutions ● http://www.aventissystems.com/Network-and-Security-Solutions-s/8262.htm Hover & Click
  • 10. Sign Up 1-855-AVENTIS | AventisSystems.com www.AventisSystems.com
  • 11. Follow Us 1-855-AVENTIS | AventisSystems.com @AventisSystems

Editor's Notes

  1. Did you know shoulder surfing and dumpster diving can lead to stolen passwords and data breaches? In this webinar, ‘Don’t Fall Victim to Social Engineering Traps’ we share best practices to avoid such situations.
  2. When people think of Information Security they often think of viruses, or a guy in a dark room hacking into their banking credentials. They rarely think about the social engineering aspect of intrusion until it’s too late. Social engineering comes in several forms, all of which are the lowest form of hacking by causing users to perform actions that divulge confidential information. There are many forms of social engineering, and we are going to discuss the primary threats companies face today. Amber Interjection This is a very important topic, Kyle. Where do we begin?
  3. You’re right about its importance, Amber. Social engineering can involve human or computer-based traps. Human social engineering traps require person to person contact and include impersonation, shoulder surfing and dumpster diving.
  4. Impersonation can be used to gain access to a network by posing as a repairman, IT support, manager or trusted third party like an auditor. Impersonation tends to work well because it is human nature to trust people with credentials of authority.
  5. On the other hand, someone who is shoulder surfing can gain sensitive or login information by simply looking over someone’s shoulder in a public place.
  6. Dumpster diving can provide access to any sensitive information on paper such as account information on mail or passwords that have been written down. Amber Interjection That is scary to think about the intrusiveness of those human social engineering traps.
  7. Exactly, Amber. Now, a common computer-based form of social engineering that can be tricky to identify is baiting. This is where the attacker creates a piece of media, such as a disk or USB flash drive, and leave it in a place it will likely be found like a sidewalk or elevator. Labeled with something intriguing that is related to the target company, an employee will pick it up and plug into their machine to see what is on the media. This is when the malware is installed into their machine. Once the autorun enables, the malware is installed, infecting the network.
  8. Now that I’ve mentioned the most common types of social engineering, I want to share some quick best practices. It is very important to ensure that your employees are properly trained to do their part. Keep all passwords private and never written down. Never open emails that are not verified. Anything that looks suspect can be opened by someone else in a virtual environment to confirm its validity without compromising the network. Never install unknown media. If something intriguing is found, even with a company logo, make sure that it is brought to someone's attention that can verify it’s authenticity prior to use. Amber Wrap-up & Close Thank you, Kyle, for these tips to avoid social engineering!
  9. We want to point out the Advanced IT Services offered by Aventis Systems include security consulting services such as assessing social security threats as well as providing and implementing security best practices.
  10. Make sure you sign up for our emails to receive product specials and keep up with our techie resources including webinars, blog articles, and more.
  11. You can also stay up-to-date by following us on Facebook and Twitter @AventisSystems.
  12. Thank you for watching!