Social Engineering & Social Networking - Your Users are a Target

Social engineering is a collection of techniques used to manipulate people into performing actions or divulging confidential information. In many instances unauthorized individuals use social engineering to target your users into clicking on links in e-mail messages, visiting fake websites, downloading and installing software, and divulging sensitive or personally identifiable information.

In a business environment, social networks can share information with customers, staff, suppliers, business contacts, investors, etc. Sales and marketing personnel can use social networks to engage in communications with customers and prospects and become a resource. Since communication is performed electronically, hackers can pose as an imposter on a social network to entice users to perform actions, disclose trade secrets, click on links to sites with Malware, etc.

Social Engineering

Users have a responsibility to help protect sensitive and proprietary information. With sufficient security education and awareness training, they are your front line of defense. Security mechanisms can include:

Social Networking

Social network policies and procedures should require settings that protect users and the organization from Internet threats. The examples listed below show how to protect users from social networking related threats.

Network security audits help ensure the organization's assets have the proper security controls in place. Social engineering security assessments help protect your sensitive data and intellectual property by evaluating and testing the effectiveness of your employee security education and awareness training. Formal and documented policies ensure a top down approach to managing security risks.

Security Blog
verified If You Want a "Security Audit"
You Need a Certified Auditor.
Certified Information Systems Auditors

Unlike a security consultant, Altius IT is certified as a Certified Information Systems Auditor to perform a security audit of your environment and issue reports and recommendations to secure your systems. After your audit, Altius IT's Auditor Opinion Letter and Secure Seal let your clients and prospects know you meet security best practice/compliance requirements.

See our In the News page for video clips of our experts on national television as well as over 40 publications featuring Altius IT. In addition to our auditor certifications we hold many security, technical, and project management credentials. More information is available on our About Us page.

Our comprehensive audit service uncovers gaps in your existing defenses so that you can better:

  • Fortify your information systems, applications, and network infrastructure
  • Comply with regulatory requirements
  • Protect your valuable assets