Tailgating in Social Engineering

The most physical and daring tactic on this list is to follow people authorized to access areas of high concentration of data and access locations. Generally, hackers pose as company employees (or, they really are) and create situations like “I forgot my access badge” or “can you hold the door? I'm going in too ”.

This type of scam is essentially simple and takes advantage of people's naivete and a little charisma on the part of the criminal. They are rarer, however, and have even been used in situations of theft of homes and commercial buildings.

To avoid social engineering scams, a company needs to structure a training and awareness process for its employees. It is important to address the following points:

Attention to avoid logged computers or papers with confidential information available;
Mistrust of abnormal situations or that seem very out of the routine of the company (such as the pendrive or the boss's email);
Knowledge about the forms of attack and their particularities (this is very important for phishing cases);
Full notion of communication processes (to generate distrust about e-mails sent by distant superiors or by sectors that do not communicate directly);
Notions of information security;
Establishment of a communication channel with those responsible for IT to analyze suspicions.
These are some of the techniques that a company can put in place to prevent social engineering scams from reaching its employees and also corporate information.

Following are the customary roles and responsibilities of a skilled Desktop Support Technician jobs:

It is necessary to keep your eyes open to threats. The advances in communication and relationship technologies on the web have increased hackers' access to information that facilitates scams, therefore, every care is little and every suspicion won't be too much!


  • No Comment Yet
Please login first for post a comment