Even the most savvy IT professionals can fall victim to social engineering attacks. Hereu2019s how to recognize these threats and avoid falling prey to them. How to Avoid Social Engineering ScamsSocial engineering threats are widespread, affecting even the most savvy IT professionals. While there’s no guaranteed way to defend against them, half the battle is recognizing the methods they use. Here are seven ways social engineers may pilfer your money and data, plus tips to protect yourself against them.The Misplaced flash DriveImage by Shutterstock One tried-and-true trick is “accidentally” dropping a flash drive in a company’s parking lot and hoping that a curious employee picks it up and plugs it into a company computer — thus launching the malware payload. While hardly new, this tactic is known to have a high rate of success. Though Microsoft has long disabled automatic app launches from portable storage drives, an enticing file name is usually enough to coerce employees to open the malware. Companies could, of course, disable USB ports altogether, though a more reasonable approach would be mandatory computer security training.Phishing Emails That Look LegitimateImage by Shutterstock While the majority of phishing email messages are poorly formatted and written in broken English, there is no shortage of believable schemes that purportedly come from credit card companies, insurance companies or even the human resources departments. Just one mistake from a distracted employee could place the local network or company in jeopardy.To defend against phishing emails, you need to understand that they are typically designed to persuade you to click on a link or submit personal information. As such, be wary of divulging any information based on an email, and never click on a URL. Always type out the URL in the browser bar instead.Emails From Friends and ColleaguesImage by Shutterstock Similar to generic phishing, spear phishing–or directed emails to a select user or group of users–is as old as scams get. However, the popularity of social media platforms makes it easier than ever for hackers to gain access to information that could be used to trick users. Examples include a fake salary spreadsheet with the name of the company, or an attachment that appears to be from a high school classmate.The bottom line is that users should be wary of all e-mail attachments, while attack vectors such as the use of malicious file attachments should be blocked directly at the email server.Beware of Phone CallsIt’s surprising what a hacker with the gift of gab can get away with: Hackers may use phone calls to either collect more personal information about you or validate what they already know as part of a larger, more elaborate attack.One of the best ways to defend against such phone calls is to take down the phone number and offer to call them right back. Alternatively, test the caller by asking them information that they should already know about you. Finally, never divulge information such as passwords over the phone.Guard Your Email AccountImage by Shutterstock Email accounts are always attractive targets to hackersgiven how they can be used to initiate password resets and gain access to a wealth of current and historical data. On this front, hackers have been known to gain access by exploiting guessable password reset questions based on publicly available information, or by successfully tricking an email provider.There may not be much that most small businesses can do about social engineering attempts made on email providers, though be sure to select a provider with a good security track record. Physical Office SecurityWhite hat security researchers have been known to gain almost unfettered access to large organizations by wearing a shirt emblazoned with the company’s logo or by tailgating employees who return from the smoking area. The risks of physical access cannot be overstated and include hackers circumventing the corporate firewall to plant malicious software on workstations from the inside.Unless you operate a small business in which everyone knows everyone, it makes sense for employees to wear a security tag with photo identification. Of course, employees should also be trained to look out for fake badges and be aware of the dangers of tailgating.Fake Windows Technical Support CallsImage by Shutterstock The widely documented fake support calls from Windows Technical Support continue to defraud users. Essentially, scammers call their victims pretending to be from Microsoft to investigate a malware attack and try to persuade users to grant them remote desktop access. Once in, they pretend to discover a serious case of malware infestation–typically by installing scrareware—and then proceed to extort a fee to resolve the problem.The solution is relatively simple: Just let users know that Microsoft simply does not call end users about possible malware infestation. Related content brandpost It’s time to evolve beyond marketing to create meaningful metaverse moments Insights on the results of the Protiviti and Oxford University survey: Executive Outlook on the Metaverse, 2033 and Beyond By Kim Bozzella Jun 08, 2023 6 mins Digital Transformation feature 10 hottest IT jobs for salary growth in 2023 The demand for tech workers hasn’t slowed down, as rising salaries reveal the most sought-after tech professionals for 2023, according to data from Dice. By Sarah K. White Jun 08, 2023 8 mins Salaries IT Jobs Careers interview Oshkosh CIO Anu Khare on IT’s pursuit of value The specialty truck maker’s IT chief sees tech-enabled transformation being fueled by a relentless focus on strategic fit and customer value — and passionate business involvement. By Dan Roberts Jun 08, 2023 9 mins Automotive Industry Manufacturing Industry IT Strategy news analysis What LOB leaders really think about IT: IDC study Businesses leaders increasingly rely on digital innovation to meet their goals but are not always giving IT a say in key business decisions, a disconnect that could hinder innovation, a new IDC study has found. By Peter Sayer Jun 08, 2023 6 mins Business IT Alignment IT Strategy IT Leadership Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe