BSN Blog 9.11.19

Hacker Helper

BSN Blog 9.11.19
 

Are You a Hacker Helper?

Here you go, let me get the door for you.  Are you looking for access to my company’s network?  One moment, let me get those login credentials for you.

Of course, this sounds ridiculous.  But in reality, it is exactly what is happening.  Cybercriminals use advanced social engineering to get to the weakest link in any organization, and that link is the same at every business, in every vertical, in every market.   Humans.

badge w light burst white (1)

Exclusively for Our MSP Partners

Now Available: Gen AI Certification From BSN

Lead Strategic AI Conversations with Confidence

Breach Secure Now’s Generative AI Certification helps MSPs simplify the AI conversation, enabling clients to unlock the value of gen AI for their business, build trust, and drive growth – positioning you as a leader in the AI space.

A recent study from Proofpoint found that in 18 months of researching attack trends, 99% of emails used to distribute malware required human interaction to click a link, open an attachment, accept a security warning, or perform another task.   This leads cybercriminals to focus on targeting humans, not necessarily systems.

Easy Access

While it is C-level and upper management that has the greatest access to data, it is sales, marketing, and HR that are most easily found online through quick searches.  Contact information for these “very attacked people” or VAPs, could easily be found for 36% of the linked identities.  Corporate websites, social media, or other channels provided easy access to finding out who exactly they needed to contact, and how they could easily do it.

Once hackers have the contact information, they can use a barrage of methods to get to the person, often creating multiple methods of attack on the same person.  Additionally, sending out group messages to common group addresses can target multiple users at once.  And all that it takes is one HR person to fail the phishing test to [email protected] and release hundreds of records on employee or client personal information.

This method often proves to be lucrative to exploiting a company, and with minimal effort going into the attack, the speed at which these attacks happen is also increasing.  Maximum output for minimum input.

Protecting the human factor of a business is no longer limited to human resources, it has become equally as important in cybersecurity.

More on blogs

MSP AI Adoption: You Can’t Sell What You Don’t Use

Many MSPs are rushing to offer AI services to clients while they haven’t implemented AI adoption within their own companies. The reality check: When clients

Making AI ROI Measurable: A Practical Approach That Works

Every client asks: "What's the ROI of AI tools?" Fair question. But here’s one back: When did you last calculate the ROI of Excel? Or
Take the First Step

Experience Training That Makes a Difference

during the demo you’ll:

Take the First Step

Experience Training That Makes a Difference

During the demo you’ll: