Social Engineering, the Flaws of Human Error, and Methods to Defend from It

3 min read

“Hi, my name is Samuel Gills, I’m one of the lead database engineers for (insert company name here). Our database for employee identification crashed overnight and we need to verify some information to ensure that what we recovered is accurate and correct, could we just have five minutes of your time to help us out with this very painstaking process.” Believe it or not calls like that come into companies all the time, in this case this is called a “Vish” (think of that as voice phishing). The ones that come in legally are executed by professional security researchers, often…...

This article is free to read

Login to read the full article


OR
Jos de Kanter J.S. is a Cyber Security bachelors student at Miami-Dade College in Florida, USA. He's fluent in Python and C++ coding languages. Having access to Windows 98 as a child with dial-up connection, J.S. took an early interest in the world of computers and their vulnerabilities. His goal as a contributor for DDI is to inform the public of how they can improve their cyber security in everyday life. J.S. is currently taking his CompTIA Security+, EC-Council Certified Ethical Hacker, and CompTIA Network+ courses for his degree to bolster his knowledge in the world of cyber security. Jos is also a FAA Part 107 commercially licensed drone pilot and flies a DJI Mavic 2 Enterprise.

Follow DDI

Gain Access to Expert Views

We won't send you spam. Unsubscribe at any time.