You’ve done your due diligence, practice good security hygiene and have the best security tools available. Now, your security posture is strong. But, your plan is only as good as your employees, and they may be letting you down when it comes to being ready for social engineering.
While employees clicking on phishing links still presents a risk for the enterprise, the use of social media introduces its own set of issues, too.
Social engineering has always been one of the easiest methods with which bad actors can infiltrate your network. In 2019, for example, about half of the attacks reported by Trustwave analysts were caused by phishing or other social engineering methods, up from 33% of attacks in 2018.
Enter Social Media Phishing
What is a common method used in social engineering? Social media phishing. The use of social media only makes problems worse. Whether they’re at work or at home, your employees may be revealing private company data on social media and not even know they’re doing anything wrong.
Every social media post and photo may contain important data threat actors could use for social engineering. For example, that team selfie you took after the strategic boardroom meeting could divulge intellectual property or confidential business data.
Other social media phishing examples aren’t so obvious. What about a public LinkedIn message praising a coworker for a new role? On its own, that information isn’t significant. But the more personal information threat actors obtain about you and your coworkers, something seemingly harmless like a LinkedIn post can be used against you.
Cybercriminals are efficient and thrive on gathering data ..