Many people are uneducated about electronic security and expose themselves to social
engineering scams or phishing. Scams may appear as bait, such as a flash disk which is
preloaded with malware, click-jacking where user unintentionally gives out personal information
by clicking prompt buttons. Pharming redirects users to scam websites (FBI, 2016). Other
methods include responding to an innocent email or an irresistible topic, replying to unconfirmed
IRS forms, bank account update, and online job offer (Norton.com, 2016). Only three percent of
attacks are technical, but 97 percent of attacks target the users themselves by manipulating their
psychology (Lord, 2015).
To avoid being phished, users should vet all inbound communication using a firewall and
antivirus program. Do not share password and bank account details (Lord, 2015). Ignore
unsolicited mail with offers. Be safe from click-jacking by not clicking answer buttons, and
lingering around suspicious websites. Avoid pharming by typing out web links instead of
copying them (FBI, 2016).
Secure all your data devices from unauthorized access. If the mail, call, or text sound
suspicious then cut and recall them yourself. Ignore all pop-up menus and instead, search for
their identities. A genuine business person does not use odd names and pictures in their social
media accounts (FBI, 2016). Ignore pop-up messages and live by company policy on data
communication (Lord, 2015). A new scam is “ransomware”, when uploaded, locks down the
storage until a ransom fee is paid. Make regular backups of your crucial data (OnGuardOnline,
2016).
What do you expect when you “accept” a lottery win that you did not play” When a deal
is too good, think twice. Do you have a personal philosophy on how to use your communication
devices? The longer you communicate the higher the risk of being scammed. Who do you turn to
when you need help with your ATM card or a blocked SIM card? Do not take the help of a total
stranger a stranger (OnGuardOnline, 2016).
SOCIAL ENGINEERING SCAMS 2
Works Cited
FBI,. (2016). Internet Social Networking Risks. FBI. Retrieved 28 February 2016, from
https://www.fbi.gov/about-us/investigate/counterintelligence/internet-social-networking-risks
Lord, N. (2015). Social Engineering Attacks: Common Techniques & How to Prevent an Attack.
Digitalgurardian.com. Retrieved 28 February 2016, from –
https://digitalguardian.com/blog/social-engineering-attacks-common-techniques-how-prevent-
attack
Norton.com,. (2016). Phishing – Antiphishing Protection. Us.norton.com. Retrieved 28 February
2016, from http://us.norton.com/security_response/phishing.jsp
OnGuardOnline,. (2016). Phishing | OnGuard Online. Onguardonline.gov. Retrieved 28 February
2016, from https://www.onguardonline.gov/phishing
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more