{"id":2732,"date":"2021-11-17T07:06:00","date_gmt":"2021-11-16T18:06:00","guid":{"rendered":"https:\/\/kinetics.co.nz\/?p=2732"},"modified":"2021-11-17T07:06:00","modified_gmt":"2021-11-16T18:06:00","slug":"beware-social-engineering-the-number-one-security-threat-to-business-is-your-people","status":"publish","type":"post","link":"https:\/\/new.kinetics.co.nz\/?p=2732","title":{"rendered":"Beware &#8211; Social Engineering! The number one security threat to business is your people!"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.17.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<p>Every business collects data, from sales leads to financial transactions and everything in between. Increasingly data is the new \u2018gold\u2019. The problem is, unlike actual gold that you can put in a vault, data is weightless, and your staff need access to your data to get their work done. Locking your data away isn\u2019t viable \u2013 you need to use it to achieve your competitive advantage.<\/p>\n<p>Unfortunately, the criminal community know this; they know your people can access your data and they want it. If they don\u2019t want to use it themselves, they want to gain access to it and control, then RANSOM it back to you. Too often, they can\u2019t get through your main security so instead they target your people. They use social engineering \u2013 (if you have time, check out <a href=\"https:\/\/www.social-engineer.org\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.social-engineer.org\/<\/a>)<\/p>\n<p><!-- divi:paragraph --><\/p>\n<p>&nbsp;<\/p>\n<p><!-- \/divi:paragraph -->[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;http:\/\/kinetics.co.nz\/wp-content\/uploads\/2023\/05\/CyberPeope.jpg&#8221; title_text=&#8221;CyberPeop;e&#8221; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; custom_padding=&#8221;28px|||||&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.17.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p><span style=\"color: #4cb84a; font-family: Montserrat, Helvetica, Arial, Lucida, sans-serif; font-size: 26px; font-weight: bold;\">Basically, they trick you and your staff into telling them your codes!<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-2894\" src=\"http:\/\/kinetics.co.nz\/wp-content\/uploads\/2018\/08\/kray.jpg\" alt=\"\" width=\"303\" height=\"211\" \/>Rather than roll out like the infamous Cray brothers, bursting in the front door with shotguns at the ready, they are crafty and subtle. Common examples include gathering personal details on social media (favourite teacher at school, favourite music etc \u2013 all those mindless quizzes on Facebook etc) \u2013 what these do is get the answer to their password reset questions. The more they know about you, the more they can use machine learning and AI to find patterns, helping them guess passwords based on the clues they gather.<\/p>\n<p>Other common tools include phishing emails, or malicious websites, keyloggers, malware. We\u2019ll talk more about these in future posts. If it seems a bit like James Bond Hollywood movies \u2013 well, we\u2019re seeing enough to say \u201cyou had better believe it\u201d!<\/p>\n<p>&nbsp;<\/p>\n<h2>So, what can you do? Educate your staff!!<\/h2>\n<p>Of course, many people tell us they know that already. But we are seeing more and more of these kinds of breaches. Unfortunately it\u2019s often the people who know the risk that are are compromised. I guess they forget or become complacent . Maybe they take it for granted, or they think you are overreacting when you warn them?<\/p>\n<h2>To deal with this, you need systems and oversight.<\/h2>\n<p>There has to be a regular programme that you can rely on to remind staff of your basic guidelines. This is too important to be something you mention occasionally with no follow up. You need to know all staff are aware of the risks and that they take it seriously. A one-off reminder won\u2019t be enough!<\/p>\n<p>That\u2019s why we built a learning tool into our KARE Foundation package; with this enhanced service we\u2019ve built in training \u2013 including in person training where practical, supported by eLearning tools for those people that can\u2019t be there on the day. This awareness is vital so our eLearning is quick and convenient so that people take up the learning and stay on their guard.<\/p>\n<p><strong><a href=\"http:\/\/kinetics.co.nz\/cybersecurity\/\">KARE Foundation<\/a><\/strong> is an enhanced proactive IT security package, designed for the modern cloud-anywhere world. It\u2019s a mixture of tools that go beyond traditional IT support to help you harden your ICT against intruders.<\/p>\n<h2>What more can you do?<\/h2>\n<p>Cert NZ is the NZ Government Cyber Security unit &#8211; it&#8217;s worth reading their top recommendations &#8211; <a href=\"https:\/\/www.cert.govt.nz\/it-specialists\/critical-controls\/\">https:\/\/www.cert.govt.nz\/it-specialists\/critical-controls\/<\/a><\/p>\n<p><strong>What&#8217;s your next step? We&#8217;ve created a simple <a href=\"http:\/\/kinetics.co.nz\/how-many-of-these-10-layers-of-cyber-protection-do-you-use\">10-point checklist<\/a> to help you navigate the cyber-risk landscape and find the right solution for you.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><!-- divi:paragraph -->\u00a0<\/p>\n<p>&nbsp;<\/p>\n<p><!-- \/divi:paragraph --><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Every business collects data, from sales leads to financial transactions and everything in between. Increasingly data is the new \u2018gold\u2019. The problem is, unlike actual gold that you can put in a vault, data is weightless, and your staff need access to your data to get their work done. Locking your data away isn\u2019t viable [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":2733,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<p><img class=\"size-full wp-image-2892 alignright\" src=\"http:\/\/kinetics.co.nz\/wp-content\/uploads\/2018\/08\/gold.jpg\" alt=\"\" width=\"289\" height=\"174\" \/><\/p>\n<p>Every business collects data, from sales leads to financial transactions and everything in between. Increasingly data is the new \u2018gold\u2019. The problem is, unlike actual gold that you can put in a vault, data is weightless, and your staff need access to your data to get their work done. Locking your data away isn\u2019t viable \u2013 you need to use it to achieve your competitive advantage.<\/p>\n<p>Unfortunately, the criminal community know this; they know your people can access your data and they want it. If they don\u2019t want to use it themselves, they want to gain access to it and control, then RANSOM it back to you. Too often, they can\u2019t get through your main security so instead they target your people. They use social engineering \u2013 (if you have time, check out [wow_colorme]<a href=\"https:\/\/www.social-engineer.org\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.social-engineer.org\/<\/a>)[\/wow_colorme]<\/p>\n<h3>Basically, they trick you and your staff into telling them your codes!<\/h3>\n<p><img class=\"alignleft wp-image-2894\" src=\"http:\/\/kinetics.co.nz\/wp-content\/uploads\/2018\/08\/kray.jpg\" alt=\"\" width=\"303\" height=\"211\" \/>Rather than roll out like the infamous Cray brothers, bursting in the front door with shotguns at the ready, they are crafty and subtle. Common examples include gathering personal details on social media (favourite teacher at school, favourite music etc \u2013 all those mindless quizzes on Facebook etc) \u2013 what these do is get the answer to their password reset questions. The more they know about you, the more they can use machine learning and AI to find patterns, helping them guess passwords based on the clues they gather.<\/p>\n<p>Other common tools include phishing emails, or malicious websites, keyloggers, malware. We\u2019ll talk more about these in future posts. If it seems a bit like James Bond Hollywood movies \u2013 well, we\u2019re seeing enough to say \u201cyou had better believe it\u201d!<\/p>\n<h3><span style=\"display: inline !important; float: none; background-color: transparent; color: #333333; cursor: text; font-family: Georgia,'Times New Roman','Bitstream Charter',Times,serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;\">So, what can you do? Educate your staff!!<\/span><\/h3>\n<p>Of course, many people tell us they know that already. But we are seeing more and more of these kinds of breaches. Unfortunately it\u2019s often the people who know the risk that are are compromised. I guess they forget or become complacent . Maybe they take it for granted, or they think you are overreacting when you warn them?<\/p>\n<p><strong>To deal with this, you need systems and oversight<\/strong>. There has to be a regular programme that you can rely on to remind staff of your basic guidelines. This is too important to be something you mention occasionally with no follow up. You need to know all staff are aware of the risks and that they take it seriously. A one-off reminder won\u2019t be enough!<br \/>That\u2019s why we built a learning tool into our KARE for Security package; with this enhanced service we\u2019ve built in training \u2013 including in person training where practical, supported by eLearning tools for those people that can\u2019t be there on the day. This awareness is vital so our eLearning is quick and convenient so that people take up the learning and stay on their guard.<\/p>\n<p><strong><a href=\"http:\/\/kinetics.co.nz\/cybersecurity\/\">KARE for Security<\/a><\/strong> complements your existing maintenance contract with an enhanced security package, designed for the modern cloud-anywhere world. It\u2019s a mixture of tools that go beyond traditional IT support to help you harden your ICT against intruders.<\/p>\n<p>What more can you do? \u00a0 Cert NZ is the NZ Government Cyber Security unit - it's worth reading their top recommendations - <a href=\"https:\/\/www.cert.govt.nz\/it-specialists\/critical-controls\/\">https:\/\/www.cert.govt.nz\/it-specialists\/critical-controls\/<\/a> - you'll see that a Kinetics KARE plan helps you minimise your risk<\/p>\n<p>\u00a0<\/p>\n\n<!-- wp:paragraph -->\n<p><\/p>\n<!-- \/wp:paragraph -->","_et_gb_content_width":"","footnotes":""},"categories":[4],"tags":[],"class_list":["post-2732","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts\/2732","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2732"}],"version-history":[{"count":0,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts\/2732\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/"}],"wp:attachment":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2732"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2732"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2732"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}