Page 32 - Cyber Warnings
P. 32







connections? Only connect to people you are confident of.

2. Beware of link or friend requests from people you have already linked to. When a friend
or colleague as you to re-link or re-friend be careful. It is probably the work of a spoofer
or a social engineer. Search for your friend’s actual profile.

Regardless, If you are suspicious, report the profile to the site.


3. Finally, be vigilant about potential attacks: whenever you receive an email from someone
asking you to review an attachment, follow a link, or take an action (including wiring
money somewhere!), ask yourself: “Is this an email that I expect, from a source that I
trust”.

The more urgency you detect in the email, or the stranger the story, the more wary you
should be.

Before you click, take steps to independently verify the legitimacy of the request.


As long as the ROI on socially engineered attacks is favorable, the criminals will continue to
create them.

And with multi-million-dollar losses from recent attacks making global headlines, it seems like
these attacks will be around for a while.



About the Author

Greg Mancusi-Ungaro is the chief marketing officer for BrandProtect, a leader in cyber threat
monitoring, intelligence and mitigation services.


He is a frequent author and speaker, and a constant evangelist on cyber security issues, the
changing nature of the modern threat landscape, and the emerging technologies that look
beyond the perimeter to drive enterprise defenses against cyberattack.

He blogs regularly on cyber threat and cyber security at info.brandprotect.com.









32 Cyber Warnings E-Magazine – July 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   27   28   29   30   31   32   33   34   35   36   37