"Moving to E5 has been really good from a security point of view... Now we can get a holistic view of what’s going on, which helps us to make changes and recommendations for future plans."
IT Service Manager
Ian Harkess
Trusted by industry leaders
Kickstart Your FastTrack Journey
Fill out the short form below to express your interest in our FastTrack programme, and we’ll be in touch soon.
Please note: A minimum of 150 enterprise licenses is required for FastTrack eligibility.
“We needed to find solutions to a variety of issues whilst being a complex business, operating in a 24/7 environment. Stripe OLT listened and understood immediately the challenges we faced.”
IT Operations Manager
Simon Darley
Trusted by industry leaders
Let's Talk
Call us on one of the numbers below, we cover the whole of the UK, so call the nearest office.
“We needed to find solutions to a variety of issues whilst being a complex business, operating in a 24/7 environment. Stripe OLT listened and understood immediately the challenges we faced.”
Social engineering relies on the exploitation and deception of individuals rather than trying to find technical vulnerabilities within a network – if your workforce is not sufficiently trained, it’s the easiest way for cybercriminals to gain access to your organisation.
2020 saw a 22.5% rise in cyber-attacks when compared to the previous year, with a staggering 67% of these attacks occurring from what’s called, social engineering.
What is Social Engineering?
In our ever-evolving digital landscape, educating and training your employees to recognise and identify cyber threats has never been more vital. In a recent report from Verizon, it was revealed that in 2023, 74% of breaches involved the human element, which includes social engineering attacks, errors or misuse, and 50% of all social engineering attacks used pretexting. This is hardly surprising when it was also revealed by Forbes Advisor that 12.7% of full-time employees work from home, while 28.2% work a hybrid model. With a likelihood for social guards to be down in a home environment, this only increases risk.
So, what is social engineering and why is it so important?
Social engineering is a term used to refer to an attack strategy used by hackers. The attack relies primarily on human interaction and manipulation, eventually causing them to break standard security practices or reveal sensitive information.
Social engineering relies on the exploitation and deception of individuals rather than trying to find technical vulnerabilities within a network – if your workforce is not sufficiently trained, it’s the easiest way for cybercriminals to gain access to your organisation.
Threat actors will often disguise themselves as a trusted entity or information source in order to gain the trust of an individual (like payroll or a supplier). As a result, the victim is more willing to reveal confidential information, click on a malicious link, or grant access to an account.
How does social engineering work?
In the majority of social engineering attacks, fraudsters will begin by investigating the chosen target and further gather background information. This potential victim could be an individual or an entire enterprise – if it is the latter, the perpetrator might begin by researching the employee structure, internal processes, potential weaknesses or any other relevant information needed to proceed with the attack.
Often, a common tactic of hackers is to examine the social media accounts of employees to study their behaviour and subsequently design a personalised and targeted attack. Once this information is gathered, any potential weaknesses are ready to be exploited.
Common methods of social engineering
There are various different types of social engineering attacks, the most notorious undoubtedly being phishing campaigns. If you want more information on how to spot this common form of attack, have a look at our annotation of a real scam email received and spotted by one of our staff.
Whilst phishing is the most popular form of social engineering attack, occurring when a hacker makes fraudulent contact with the victim via email or texts, there are multiple other types of social engineering methods you might not have heard as much about…
Spear Phishing
Spear phishing is (not surprisingly) an advanced form of phishing attack. Whilst phishing campaigns are often formed through identical scam emails sent to thousands of individuals in the hope that one lands, spear phishing is much more targeted. A spear phishing attack is specific to the victim, using personal information to gain trust and appear valid. Unsurprisingly, the personal nature of this tactic means it tends to have a much higher success rate in deceiving the victims as opposed to regular phishing emails.
Baiting
Baiting is when a cyber-criminal leaves a malware-infected device (or ‘bait’) somewhere that is likely to be found. This device would typically be a USB flash drive or CD, often marked with company information for added authenticity. The success of this method is based on the expectation that whoever finds the bait will load it into their computer out of curiosity (particularly if it is marked with something enticing that plays on the prying nature of humans), and subsequently install the malware.
Pretexting
In this tactic, the attacker obtains confidential information by lying to the victim and creating false circumstances in which to gain access or data. An example of this could be the perpetrator impersonating co-workers or official authorities and pretending to need personal information in order to confirm the victim’s identity.
Through pretexting, the scammer can gather information such as login credentials, financial details, access to networks and more. This is particularly effective as it often uses fear and intimidation on the victim if the scammer is impersonating an authoritative figure.
Tailgating
Tailgating is a physical social engineering method whereby an unauthorised individual gains entry into a secure location by following behind an authorised user. This could happen by asking somebody to hold a door open for them, or even to borrow their phone to call a friend, whilst unknowingly installing malware or stealing information. This technique is also sometimes known as piggybacking and targets trusting individuals.
Quid pro quo
This attack method occurs when a cybercriminal requests sensitive information from the victim in exchange for a service or some sort of compensation. An example of this could be requesting personal credentials in order to receive a free gift, or pretending to assist with IT support. This method can be particularly effective around holidays – playing on those happy to hear about Christmas offers and discounts!
Scareware
This technique involves victims receiving false alarms and threats to scare the user into purchasing or installing fake antivirus protection – this would then install the attacker’s malware. Common forms of scareware include pop-up banners in your browser, but it can also be circulated through emails.
The list of social engineering tactics is extensive, but through awareness and education, it’s easy to spot the most common methods when used.
How to prevent social engineering attacks
Education
In order for a business to be truly prepared for social engineering attacks, prevention through education is key. Here at Stripe OLT, we can help turn your workforce into the first line of security defence with our cyber security education courses.
Our GCHQ-certified trainers provide Staff Cyber Awareness (SCA) and Executive Cyber Fundamentals (ECF), covering specific areas of business risk and how to mitigate these appropriately. Our ECF course has a specific section focused on social engineering. If your employees are aware of the various forms of social engineering, they are less likely to fall victim!
Penetration Testing
This type of assessment provides an in-depth understanding of your cyber security posture, whilst also being able to identify which employees may require further training. Security experts universally advise regular penetration testing in order to identify and prioritise all risks to your organisation, including social engineering.
Antivirus and anti-malware software
Having solid, reliable and up-to-date antivirus and anti-malware protection will prevent scams from reaching the user’s mailboxes – reducing the likelihood of an employee clicking a malicious link in the first place! Automatic updates are a dependable way to ensure you stay up to date with the latest software.
Multi-Factor Authentication
Ensuring your workforce utilises multi-factor authentication can assist in protecting your account if the system gets compromised. For example, a combination of passwords, used alongside biometrics, is one way to help avoid social engineering attacks.
Robust technology is undoubtedly necessary for cyber security protection, but ultimately, it is the combination of the right technology underpinned by an educated workforce that will protect your business from internal and external attacks.
If you would like more information on how our highly accredited SecOps team can test and protect your organisation, get in touch.
Stripe OLT has achieved the Microsoft Cloud Security Specialisation, proving our expertise in securing Azure and Microsoft cloud environments. Learn what this means for your business.
Stripe OLT is now part of the Microsoft FastTrack Program, giving SMEs direct access to expert-led cloud adoption, security, and digital transformation - at no extra cost. Find out how this accelerates your IT resilience?
Don’t let cyber criminals turn your holiday deals into a data breach. Check out our bite-sized security guide to keep your users, and your business, safe this shopping season.
Across the world, Windows computers have by effected the dreaded Blue Screen of Death (BSOD). This appears to have been caused by an outage of services provided by cyber security provider, CrowdStrike. The issue appears to have impacted a large number of organisations - from banks to airlines. Here are the current advisories.
Across the world, Windows computers have by effected the dreaded Blue Screen of Death (BSOD). This appears to have been caused by an outage of services provided by cyber security provider, CrowdStrike. The issue appears to have impacted a large number of organisations - from banks to airlines. Here are the current advisories.
We're thrilled to share the news: Stripe OLT has been recognised as one of the top 50 emerging stars at the prestigious Megabuyte100 Awards 2024. These awards stand out in the UK's tech landscape, offering an unbiased, expert analysis of companies' financial prowess via the Megabuyte Scorecard.
A big congratulations to our Microsoft 365 guru, Lewis Barry, who received MVP status for his incredible work within the Microsoft technology community.
Last week, the 2023 Scale-Up Awards took place at Novotel London West, concluding months of nominations and judging for this years’ most successful entrepreneurs and scale-up organisations. Naturally, we were extremely happy to be in attendance, but it turned out to be a very successful night...
As you may have seen in the press earlier this year, Stripe OLT recently achieved two crucial Microsoft certifications, in both Modern Work and Security. As such, we’re very proud to announce our cyber security team’s latest achievement - the Microsoft Security Threat Protection specialisation.
This website uses cookies. By using this site you agree to our use of cookies. We use cookies to enhance your experience. To understand the specific cookies we use and how we handle your data, see out Cookie Policy, Privacy Policy and Terms & Conditions. Manage your preferences at any time by clicking the 'View Preferences' button.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.