{"id":30771,"date":"2020-12-11T14:37:00","date_gmt":"2020-12-11T21:37:00","guid":{"rendered":"https://www.webroot.com/blog/?p=30771"},"modified":"2020-12-11T14:37:01","modified_gmt":"2020-12-11T21:37:01","slug":"staying-a-step-ahead-of-the-hack","status":"publish","type":"post","link":"https://www.webroot.com/blog/2020\/12\/11\/staying-a-step-ahead-of-the-hack\/","title":{"rendered":"Staying a Step Ahead of the Hack"},"content":{"rendered":"\n<p>Hackers, never at a loss for creative deception, have engineered new tactics for exploiting the weakest links in the cybersecurity chain: ourselves! Social engineering and business email compromise (BEC) are two related cyberattack vectors that rely on human error to bypass the technology defenses businesses deploy to deter malware.<\/p>\n\n\n\n<h2>Social Engineering<\/h2>\n\n\n\n<p>Social Engineering is when hackers impersonate trusted associates or acquaintances to manipulate people into giving up their passwords, banking information, date of birth or anything else that could be used for identity theft. As it turns out, it\u2019s easier to hack our trust than our computers. Social engineering covers a range of tactics:<\/p>\n\n\n\n<ul><li><em>Email from a friend or family member<\/em> \u2013&nbsp;A hacker gets access to the email password of someone you know. From there, they can send you a malicious link in an email that you\u2019re more likely to click on because it came from someone you trust.<\/li><\/ul>\n\n\n\n<ul><li><em>Compelling story (pretexting)<\/em> \u2013 This includes urgently asking for help. This can read like, \u201cYour friend is in danger and they need your help immediately \u2013 please send me money right away so they can get treatment!\u201d<\/li><\/ul>\n\n\n\n<ul><li><em>Standard phishing tactics<\/em> \u2013 Phishing techniques include website spoofing emails appearing to come from an official source asking you to reset your password or confirm personal data. After clicking the link and entering the info, your security is compromised.<\/li><\/ul>\n\n\n\n<ul><li>\u201cYou\u2019re a winner\u201d notifications \u00ad\u2013 Whether a lottery prize or a free trip to Cancun, this tactic catches many off guard. It\u2019s known as \u201cgreed phishing\u201d and it takes advantage our fondness for pleasure or weakness for the word \u201cfree.\u201d<\/li><\/ul>\n\n\n\n<h2>Business Email Compromise<\/h2>\n\n\n\n<p>Business email compromise is a targeted attack against corporate personnel, usually someone with the authority to request or fulfill a financial transaction. Victims execute seemingly routine wire transfers to criminals impersonating legitimate business associates or vendors.<\/p>\n\n\n\n<p>This form of fraud relies on a contrived pretext to request a payment or purchase be made on the attacker\u2019s behalf. According to the FBI, BEC attacks resulted in more than $26 billion (you read that right) between June 2016 and July 2019. Here are a few tips for protecting users and businesses from BEC attacks:<\/p>\n\n\n\n<p><em>Slow down<\/em> \u2013 BEC attacks combine context and familiarity (an email from your boss) with a sense of urgency (I need this done now!). This causes victims to lose their critical thinking capabilities.<\/p>\n\n\n\n<p><em>Don\u2019t trust, verify<\/em> \u2013 Never use the same channel, in this case email, to verify the identity of the requester. Pick up the phone and call, or use video chat.<\/p>\n\n\n\n<p><em>Prepare for the inevitable<\/em> \u2013 Use all the technology at your disposal to ensure a BEC attack doesn\u2019t succeed. Machine learning-enabled endpoint security solutions can help identify malicious sites.<\/p>\n\n\n\n<p><em>Address the weakest link<\/em> \u2013 Train users to spot BEC attacks. Webroot testing shows that phishing simulations can improve users\u2019 abilities to spot attacks.<\/p>\n\n\n\n<h2>Perfecting Your Posture<\/h2>\n\n\n\n<p>Webroot Security Intelligence Director, Grayson Milbourne, offers several suggestions that companies can do to increase their security posture. First, he says, \u201cWhenever money is going to be sent somewhere, you should have a two-factor verification process to ensure you&#8217;re sending the money to the right person and the right accounts.\u201d<\/p>\n\n\n\n<p>Milbourne is also a big advocate of security awareness training. \u201cYou can really understand the security topology of your business with respect to your users\u2019 risk factors,\u201d he says. \u201cSo, the engineering team might score one way and the IT department might score another way. This gives you better visibility into which groups within your company are more susceptible to clicking on links in emails that they shouldn&#8217;t be clicking.\u201d<\/p>\n\n\n\n<p>With the increase in scams related to the global COVID-19 pandemic, timely and relevant user education is especially critical. \u201cCOVID obviously has been a hot topic so far this year, and in the last quarter we added close to 20 new templates from different COVID-related scams we see out in the wild,\u201d Milbourne says.<\/p>\n\n\n\n<p>\u201cWhen we look at first-time deployment of security awareness training, north of 40% of people are clicking on links,\u201d Milbourne says. \u201cThen, after going through security awareness training a couple of times, we see that number dip below 10%.\u201d<\/p>\n\n\n\n<p><strong>Where to learn more<\/strong><\/p>\n\n\n\n<p>Our newest research on phishing attacks and user (over)confidence, <a href=\"https:\/\/mypage.webroot.com\/covid-clicks.html\">\u201cCOVID-19 Clicks: How Phishing Capitalized on a Global Crisis\u201d<\/a> is out now, check it out!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hackers, never at a loss for creative deception, have engineered new tactics for exploiting the weakest links in the cybersecurity chain: ourselves! Social engineering and business email compromise (BEC) are two related cyberattack vectors that rely on human error to bypass the technology defenses businesses deploy to deter malware. Social Engineering Social Engineering is when [&hellip;]<\/p>\n","protected":false},"author":175,"featured_media":30773,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/30771"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/175"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=30771"}],"version-history":[{"count":1,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/30771\/revisions"}],"predecessor-version":[{"id":30775,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/30771\/revisions\/30775"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/30773"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=30771"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=30771"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=30771"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=30771"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}