Feature Article:

PR: Let's Talk Fundamentals
Please feel free to publish this article and resource box in your ezine, newsletter, offline publication or website. A copy would be appreciated at bobkelly@TNI.net. Word count is 840 including guidelines and resource box. Robert A. Kelly ©...
...Read More


Social Engineering - The Real E-Terrorism?


One evening, during the graveyard shift, an AOL technical support operator took a call from a hacker. During the hour long conversation the hacker mentioned he had a car for sale. The technical support operator expressed an interest so the hacker sent him an e-mail with a photo of the car attached. When the operator opened the attachment it created a back door that opened a connection out of AOL's network, through the firewall, allowing the hacker full access to the entire internal network of AOL with very little effort on the hacker's part.

The above is a true story and it is an excellent example of one of the biggest threats to an organisation's security - social engineering. It has been described as people hacking and it generally means persuading someone inside a company to volunteer information or assistance.

Examples of techniques employed by hackers include:

  • Unobtrusively observing over your shoulder as you key in your password or PIN.

  • Calling helpdesks with questions or being overly friendly

  • Pretending to be someone in authority.

Social engineering attacks can have devastating consequences for the businesses involved. Accounts can be lost, sensitive information can be compromised, competitive advantage can be wiped out and reputation can be destroyed.

By implementing some simple techniques you can reduce the risk of your organisation becoming a victim or, in the event that you are targeted, keep the consequences to a minimum.

  • Make sure that all staff, especially non-IT staff, are aware of the risk of social engineering and what to do in the event of such an attack.

  • Conduct regular security awareness training so that all staff are kept up to date with security related issues.

  • Implement a formal incident reporting mechanism for all security related incidents to ensure there is a rapid response to any breaches.

  • Ensure that the company has security policies and procedures in place, that all staff are aware of them and that they are followed.

  • Put an information classification system in place to protect sensitive information.

Conduct regular audits, not only on IT systems but also on policies, procedures and personnel so that any potential weaknesses can be addressed as soon as possible.

Rhona Aylward has extensive experience in the area of Quality Management and more recently in Information Security Management. She is a qualified Lead Auditor for BS7799 and CEO for Alpha Squared Solutions Ltd.




More Reading:

What Home Refinance does for you

Two Steps to Improving Your Marketing Success

Selling To Your Difficult Person

Payday loan A Complete overview

The Matrix Is Real 5 Ways to Pull Yourself Free and Live More Prosperously

Selling Your Home In The Winter

Managers and PR Genius

Organization Tips How to Organise Your Computer Files

Should you choose to refinance

The Conflict of Interest Game


Business Search 


Additional Reading

What Home Refinance does for you
Home Refinance - Basically, a home refinance is paying off one home loan with another loan. So the question is, should you refinance or not? How do you know when it is right for you to get a home refinance mortgage? In other words,...
...Read More

Two Steps to Improving Your Marketing Success
Since the human brain seems to be able to focus on only one thought at a time, it's difficult to evaluate an advertising idea from the perspective of both a marketer and a customer. That's why it's necessary to use a two-step process when...
...Read More

Selling To Your Difficult Person
We all have people whom we find difficult. We don't understand them, connect with them, or even talk comfortably with them. But, when we own a one person business, seeing someone as difficult gets in the way of our selling effectively and their...
...Read More

Payday loan: A Complete overview
From different surveys, it is seen that the number of customers taking payday loan as well as payday lending companies are increasing frequently. If you are a person taking the payday loan for the first time or want to gather information regarding...
...Read More

“The ‘Matrix’ Is Real: 5 Ways to Pull Yourself Free and Live More Prosperously”
As millions of people flood cinemas to see the new “Matrix” movie, most of them will have no idea that in fact they’re plugged into a real-life matrix. However, the real life matrix is not run by power-hungry computers; it has everything to...
...Read More