{"id":160608,"date":"2021-10-15T06:00:00","date_gmt":"2021-10-15T11:00:00","guid":{"rendered":"https:\/\/www.ict-pulse.com\/?p=160608"},"modified":"2021-10-15T06:04:33","modified_gmt":"2021-10-15T11:04:33","slug":"the-illusion-of-trust-why-the-security-threat-is-a-lot-closer-than-you-think","status":"publish","type":"post","link":"https:\/\/ict-pulse.com\/2021\/10\/the-illusion-of-trust-why-the-security-threat-is-a-lot-closer-than-you-think\/","title":{"rendered":"The illusion of trust: Why the security threat is a lot closer than you think"},"content":{"rendered":"\n

To commemorate cybersecurity awareness month, we discuss social hacking and the security threat we are to ourselves.<\/em><\/p>\n\n\n\n

 <\/p>\n\n\n\n

We have all heard the phrase \u2018stranger danger\u2019. It is a phrase that children, particularly in developed countries, are taught warning them not to trust strangers and that all strangers could potentially harm them. Us adults, on the other hand, should have developed sufficient discernment, so that we do not need to take the \u2018stranger danger\u2019 warning to heart.<\/p>\n\n\n\n

To a considerable degree, humans, and more specifically, adults, are conditioned to trust our five senses: particularly, what we can see, hear and touch, which in turn feed into our intuition and our sense of safety. It is therefore why we are prepared to believe and act on what we read, and if we interact with a stranger briefly and there seems to be good rapport, we can become less guarded and more trusting. However, how does our ability to trust, and to discern who and what to trust, translate in the digital space?<\/p>\n\n\n\n

 <\/p>\n\n\n\n

The uptick in technology use has made us more vulnerable<\/h2>\n\n\n\n

In the digital world, and although we might not realise it, we are even more handicapped. Essentially, we can only rely on two senses: sight and hearing. Further, as our countries continue to transition to Information Societies and digital economies, our reliance and use of technology also has been increasing, and has even accelerated due to the COVID-19 pandemic. As a result, we have been relying, even more than we did before, on the internet and ICT to keep our everyday lives, and by extension, our business and societies, functioning.<\/p>\n\n\n\n

However, as we have become aware, this uptick in technology use has been a boon for hackers. Many platforms were not ready for the growth in demand for their services, and so became more vulnerable as they tried to evolve to accommodate. Additionally, many people found themselves in uncharted territories, in having to rely on online or digital services that replaced the in-person interactions that were no longer permitted, thanks to COVID-19, but which may have caused them to be more exposed to a broad range of threats.<\/p>\n\n\n\n

 <\/p>\n\n\n\n

Social engineering is on the rise and has gone social<\/h2>\n\n\n\n

The threats in the digital space tend to fall into two broad categories: technical hacking; and social engineering. Generally, technical hacking speaks to the use of digital tools and techniques that does not required interaction with users (or the prospective victims) in order to compromise devices or even networks. Commonly used tools and techniques include, viruses, worms, trojans, botnets and ransomware, to name a few.<\/p>\n\n\n\n

On the other hand, and with social engineering, attackers use individuals \u2013 using psychological manipulation \u2013 to compromise devices and\/or to share private information, which can then be exploited. Although we have all heard about security breaches of large organisations due to viruses and ransomware for example, increasingly, the initial compromise was due to an individual within those organisations who unwittingly facilitated the breach.<\/p>\n\n\n\n

It is also important to highlight the fact that in the world of security, the attackers tend to be one step ahead, with security professionals and firms reacting to and trying to develop remedies, such as new intrusion detection tactics and tools, along with new protocols. However, when the enemy is within, that is the person who falls prey to a social engineering-based threat, who could be any one of us, all of these new-fandangle tools and protocols might be of little use.<\/p>\n\n\n\n

It is also important to highlight that social engineering-based hacking is increasing, and in that context, humans tend to be the weakest link. Further, and although we may all be familiar with phishing emails, such as those about Nigerian princes who are willing to give us hundreds of millions of dollars if we send some money to him, or from courier companies about deliveries we know nothing about, these days, increasingly social hacking is leveraging social media, which makes the threat even more insidious.<\/p>\n\n\n\n

 <\/p>\n\n\n\n

Stranger danger?<\/h2>\n\n\n\n

Without a doubt, most of us have social media accounts and are using them with varying degrees of intensity. However, two phenomena that social media appears to foster are a sense of intimacy that can appear to exist, and a need to feel connected to, and validated by, those in your network. This environment can lead individuals to overshare. In report published by social security firm Tessian<\/a>, it found that<\/p>\n\n\n\n

84% of people post on social media every week, with two-fifths (42%) posting every day. More than half (55%) of the people Tessian surveyed have public Facebook profiles, while 67% have public Instagram accounts.<\/em><\/p>(Source:  Fast Company<\/a>)<\/cite><\/blockquote>\n\n\n\n

With all of this information being made publicly available via our social media accounts, for example, we make it easier for cybercriminals to learn seemingly intimate details about our lives, which can be used to gain our trust. Moreover, and since to a considerable degree, much of the communication we receive is via emails, instant, direct and text messages, the visual cues that one might have when talking in person are absent, which can handicap our discernment.<\/p>\n\n\n\n

 <\/p>\n\n\n\n

Go back to basics and cover your bases<\/h2>\n\n\n\n

In the absence of visual cues, there are still things you can do to keep safer online, much of which has been said before yet bears repeating. First, use strong passwords, at least 15 characters and a combination of upper and lower case letters, numbers and symbols. Second, do not reuse passwords.<\/p>\n\n\n\n

Along the social engineering front, be mindful of the amount of details of yourself that is available online, and accordingly be careful about what you post. Every bit of information can be a clue to reveal more of who you are to persons who might wish you harm. Additionally, carefully consider the persons who you allow to connect with you. Yes, it can be a bit of an ego trip to have a large social network, but that inherently increases your exposure to individuals you really don\u2019t know.<\/p>\n\n\n\n

Finally, when you are checking your emails, pay attention. There may be subtle (and not so subtle) hints that it is a scam email. If, for example, within the body of an email, you are correctly addressed, but somehow are still unsure, a good place to start when in doubt is to check the sender\u2019s email address. In many instances, the email address has no bearing on who the sender proclaims to be, and so may confirm your gut instinct. Also, if you are not sure what to do, reach out to someone in your circle who might be more experienced in these matters. The key is to be vigilant.<\/p>\n\n\n\n

 <\/p>\n\n\n\n

 <\/p>\n\n\n\n

Image credit: Gerd Altmann (Pixabay<\/a>)<\/em><\/p>\n\n\n\n

 <\/p>\n","protected":false},"excerpt":{"rendered":"

To commemorate cybersecurity awareness month, we discuss social hacking and the security threat we are to ourselves.<\/p>\n","protected":false},"author":2,"featured_media":160610,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","om_disable_all_campaigns":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[11],"tags":[105,262,41],"class_list":["post-160608","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ict-tech","tag-cybercrimecybersecurity","tag-it-security","tag-privacy","et-has-post-format-content","et_post_format-et-post-format-standard"],"jetpack_publicize_connections":[],"aioseo_notices":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/i0.wp.com\/ict-pulse.com\/wp-content\/uploads\/2021\/10\/Trust-Mistrust-Street-Sign-Signpost-Feeling-Gerd-Altmann-Pixabay.jpg?fit=1024%2C519&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/p2iE1G-FMs","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/160608","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/comments?post=160608"}],"version-history":[{"count":4,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/160608\/revisions"}],"predecessor-version":[{"id":160620,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/160608\/revisions\/160620"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/media\/160610"}],"wp:attachment":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/media?parent=160608"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/categories?post=160608"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tags?post=160608"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}