Social Engineering – Don’t let anyone manipulate you

You play a role in preventing social engineering.

So, just what is social engineering? It’s a vague term that’s used for online shenanigans and trickery by dishonest people.

Here’s what it means to you. Not all “hacks” or online schemes/scams are computer to computer…some start simply “person to person.” Yes, there are online scams that involve a somewhat social aspect.

The “social” aspect isn’t face to face and isn’t meant to suggest that you necessarily interacted with a hacker in any way. Instead, it refers to online con artists using personal information or details they learn about an individual (and companies) to either impersonate or use as leverage to gain our confidence.

And they learn these juicy tidbits online, here and there, and they use them to gain your confidence, develop a flimsy relationship, and do online damage.

Here are a couple of examples.

The swindler. A con artist has gone onto your Facebook page and sees that you like baseball and went to Jefferson High School. With your name and city listed, he somehow manages to find your home phone number. He then calls you, saying he’s with the Jefferson High reunion committee. Oh, you’re a baseball fan too? Great! The con artist talks you into donating $200 to the committee. You’ve been swindled by someone you don’t know, but who used Social Engineering (or Social Manipulation) to gain your trust.

The impersonator. An IT technician calls someone in the Finance department at ABC Data Company and requests sensitive data, he says, to complete important technical operations. Using the right jargon and tossing out a few names of company executives, he requests, and receives a password, a purchase order or some valuable company information. However, the technician is an imposter who, through Social Engineering, has gathered just enough information to sound like an IT rep for the company.

Information: The Currency of Social Engineering

Here’s the point of all this. The more “private” or discriminating you can be with personal information you make available online, the less strangers know about you—and the less usable information a Social Engineer can pull together to target you with.

Social engineering is something that millions of people do, without bad intentions. When someone has an important job interview, they’ll often do some research on the interviewer (Are they into sports? Where did they go to college? What are their interests?)

Social Engineering for criminal purposes, however, is different matter and a growing problem. And at the heart of the problem is this: more and more details about our lives are splashed all over the Internet.

And many people are “guilty” (innocently enough) of revealing information that tells our Facebook friends what you like doing and what your opinions are…but is also valuable to Social Engineers.

Remember, the simplest way for a non-hacking Social Engineer to disrupt your life with minimal effort is by impersonating you online or tricking you into trusting them.

Here are some tips, provided by experts, to help you lower your Internet profile and reduce the amount of personal information about yourself.

Never give out information by clicking a link or when someone calls you.

Don’t be so fast to believe they are truly who they say they are. If your bank calls you asking for information, hang up (courteously) and ask if you can call them back. When the retailer Target was hacked, they announced they were offering free credit reports. Social Engineers “targeted” customers with a scam email offering the free credit report. If you’re guard is up, you’ll learn to think twice before falling the trick.

Don’t put anything on social media or online that you wouldn’t want hackers to know.

Whatever you put on Facebook and other Social Media platforms (SnapChat, Twitter, Instagram, etc.) becomes public knowledge. There’s a slice of history about you that gives a Social Engineer plenty to work with. Where’s the danger? If you happen to receive an email from someone who seems to know a lot about you, you’re likely to offer up some “innocent information” about yourself…where you work, etc.

Keep watch over what you’re tagged in on other’s profiles.

If you’re out of work, for example, or going in for a medical procedure, ask your family not to include that kind of information on Social Media. Not only does it keep your personal and family life private, it denies a predator Social Engineer the chance, for example, to impersonate someone with a job offer.

Keep your password hints or recovery questions off social media.

One security expert recently said that if you’re in the habit of using your dog’s name as a password, you should not have it anywhere online. Examine your passwords: do you have your birthday or your anniversary published…and do you use it as a password, even backwards? It’s a good idea to keep “identifiable” data about yourself private. Why do strangers even need to know your anniversary, the name of your first pet of your mother’s maiden name? All those types of details are gold for Social Engineers.

The less you publish about yourself online, the lower the possibility of being fooled by someone with a few facts about your life, a lot of nerve and bad intentions.

Picture of <span>About The Author</span>Chris Parker

About The AuthorChris Parker

Chris Parker is the founder of WhatIsMyIPAddress.com, one of the world’s most popular websites for online privacy and security with over 13 million monthly visitors. He is also the host of the Easy Prey podcast, where he interviews experts and survivors to uncover the tactics behind scams, fraud, and digital manipulation. Chris is the author of Privacy Crisis: How to Maintain Your Privacy Without Becoming a Hermit, a practical guide to protecting personal information in today’s surveillance-driven world. His work has been featured on ABC News and numerous podcasts, making him a trusted voice on how to stay safe, secure, and private online.
Share Post:

INSIGHTS YOU

MAY ALSO LIKE

You play a role in preventing social engineering. So, just what is social engineering? It’s a vague term that’s used for online shenanigans and…

If you think that only your Internet Service Provider (ISP), such as Cox Cable or Verizon, knows your IP address, think again. (Your IP…

This post was moved over from an old blog of mine that I’ve since taken down. Several years ago I purchased an APC AP9630…

WHAT PEOPLE SAY

ABOUT CHRIS

DOWNLOAD CHRIS’ BOOK

PRIVACY CRISIS

DOWNLOAD YOUR FREE PDF, MP3, and workbook by entering your details below.

We respect your privacy. 

Don’t want to share your email?

Privacy Policy

This following document sets forth the Privacy Policy for this website.

Collection of your personal information

We collect Non-Personally Identifiable Information from visitors to this Website. Non-Personally Identifiable Information is information that cannot by itself be used to identify a particular person or entity, and may include your IP host address, pages viewed, browser type, Internet browsing and usage habits, advertisements that you click on, Internet Service Provider, domain name, the time/date of your visit to this Website, the referring URL and your computer’s operating system.

Free offers & opt-ins

Participation in providing your email address in return for an offer from this site is completely voluntary and the user therefore has a choice whether or not to disclose your information. You may unsubscribe at any time so that you will not receive future emails.

Sharing of your personal information

Your personal information that we collect as a result of you purchasing our products & services, will NOT be shared with any third party, nor will it be used for unsolicited email marketing or spam. We may send you occasional marketing material in relation to our design services.

What Information Do We Collect?

If you choose to correspond with us through email, we may retain the content of your email messages together with your email address and our responses.

Cookie Based Marketing

Some of our advertising campaigns may track users across different websites for the purpose of displaying advertising. We do not know which specific website are used in these campaigns, but you should assume tracking occurs, and if this is an issue you should turn-off third party cookies in your web browser.

How Do We Use Information We Collect from Cookies?

As you visit and browse Our Website, the Our Website uses cookies to differentiate you from other users. In some cases, we also use cookies to prevent you from having to log in more than is necessary for security. Cookies, in conjunction with our web server log files or pixels, allow us to calculate the aggregate number of people visiting Our Website and which parts of the site are most popular.

This helps us gather feedback to constantly improve Our Website and better serve our clients. Cookies and pixels do not allow us to gather any personal information about you and we do not intentionally store any personal information that your browser provided to us in your cookies.

IP Addresses

P addresses are used by your computer every time you are connected to the Internet. Your IP address is a number that is used by computers on the network to identify your computer. IP addresses are automatically collected by our web server as part of demographic and profile data known as traffic data so that data (such as the Web pages you request) can be sent to you.

Sharing and Selling Information

We do not share, sell, lend or lease any of the information that uniquely identify a subscriber (such as email addresses or personal details) with anyone except to the extent it is necessary to process transactions or provide Services that you have requested.

How Can You Access and Correct Your Information?

You may request access to all your personally identifiable information that we collect online and maintain in our database by using our contact page form.

Changes to this Privacy Policy

We reserve the right to make amendments to this Privacy Policy at any time. If you have objections to the Privacy Policy, you should not access or use this website. You may contact us at any time with regards to this privacy policy.