Social Sneakiness - WebINTENSIVE Software
4525
single,single-blog,postid-4525,ajax_fade,page_not_loaded,,,qode-child-theme-ver-1.0.0,qode-theme-ver-6.5,wpb-js-composer js-comp-ver-4.4.3,vc_responsive

Blog

Nov 21, 2012 Social Sneakiness

South Carolina got hit, and hit hard. In the most damaging cyberattack ever launched against a state government, a hacker used stolen credentials to snatch 3.8 million unencrypted Social Security numbers and other taxpayer data.

The attacker reportedly obtained the credentials by tricking a government employee into opening a malicious file. You can help ward off such nightmare scenarios by training your employees to recognize common socially engineered attacks, such as spear phishing, and by formulating appropriate security procedures.

If a crafty social engineer does manage to sneak in, you need to have a strong second line of defense. Above all, encryption of sensitive data should be standard procedure.