
{"id":2035,"date":"2012-09-07T00:00:00","date_gmt":"2012-09-07T00:00:00","guid":{"rendered":"http:\/\/otava.test\/social-engineering-security-is-a-mindset\/"},"modified":"2012-09-07T00:00:00","modified_gmt":"2012-09-07T00:00:00","slug":"social-engineering-security-is-a-mindset","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/social-engineering-security-is-a-mindset\/","title":{"rendered":"Social Engineering: Security is a Mindset"},"content":{"rendered":"<p>Social engineering is an amorphous subject. In essence, the idea is to coerce someone into giving you information and\/or access that, by all accounts, you shouldn\u2019t have. However, the ways that social engineers can maliciously get anything from credit card information to usernames and passwords is almost infinite.<\/p>\n<p>And why not use this method? If I had the choice between breaking a door down, or having someone from inside opening it for me, I can assure you it wouldn\u2019t take me long to decide which one to pick. Social engineering in many cases can be easier than trying to break into a system, and could leave the hacker with less fingerprints on the proverbial door-knob. Likely, most people are at this point familiar with Mat Hunan\u2019s story from Wired Magazine. In just half an hour he had all his passwords changed, his phone, tablet, and macbook wiped, as well as his Google account deleted. Goodbye baby pictures of his daughter, and extensive contact list (among many other things). All this because the hacker liked Hunan\u2019s Twitter handle, and wanted to get into the account. The social engineer was able to do this by calling up the support lines of both Apple and Amazon, and gathering enough info from one rep to call the other and get a temporary password sent. Once he was in, he locked Hunan out, and proceeded to completely destroy his online presence.<\/p>\n<p>Other examples of <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/how-to-protect-yourself-against-social-engineering\/\">social engineering<\/a> tactics can include simple things like a man dressed as a UPS worker standing outside an office, looking for help with the door. An email designed to look like a large (and trusted) company explains that there\u2019s some security trouble, and needs you to follow this link and enter your username and password so you can change it and keep your information secure. \u00a0A virus-laden USB drive left around the office, waiting for the first unsuspecting worker to plug it into their computer so they might find the owner in order to return it.<\/p>\n<p>If there are so many tricks and tactics used by social engineers to get this information, why aren\u2019t people more aware of the risks? A fundamental issue as illustrated by Bruce Schneier in the TedTalks lecture Bruce Schneier: The Security Mirage, is that security is split into Feeling and Reality. Feeling secure and being secure are two different aspects of the same concept, and this oftentimes is the gap that social engineers sneak through. If someone dressed as a police officer or an auditor walks up to you, there\u2019s an inherent feeling of safety and security. I spoke with Steve Aiello, Sr. Systems Engineer, CISSP at Online Tech, who explained to me that \u2018security is a mindset. It\u2019s important to look at each situation before giving information and wonder \u2018What is the motivation behind this? Why do they need this information?\u2019<\/p>\n<p>He went on to talk about specific examples of instances when hackers had attempted to get information from him. \u201cPeople used to contact me all the time offering jobs. They would explain this great opportunity and spend some time with me on the phone. Then they would send me an application that requested information like my social security number. Simply doing some research on the company I found that they weren\u2019t a real business, and told them I wouldn\u2019t give them any information. They can be really patient too, I remember him spending a lot of time on the phone trying to convince me.\u201d<\/p>\n<p>Asking yourself why someone needs the information they\u2019re asking from you is one of the simplest ways to catch some of these threats. There should be no reason that anyone would need your login credentials. So if someone\u2019s asking, you need to wonder why. Also, be aware of what the information you\u2019re giving out can potentially do. What can someone do if they know your email address? Your home address? Your phone number? It might not be as obvious as \u2018give me your bank account number\u2019, but with just a few details and a little research it won\u2019t be hard for a social engineer to get everything they need.<\/p>\n<p>Steve also explained some other <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/how-to-protect-yourself-against-social-engineering\/\">measures you can take<\/a> to keep yourself and your business as safe as possible: \u2018Nothing can fully prevent social engineering from happening. Antivirus is useless if you\u2019re a specific target because they\u2019ll get their information from people. That\u2019s why it\u2019s so important to train your employees. You need to have very specific processes, and they need to be followed exactly. Also, the workers need to know that they have support from their superiors. I always say if a client is upset because of a process that we have in place, and that makes one of our support individuals uncomfortable, let me talk to them. I\u2019ll back them up so they know it\u2019s okay to push back on those clients. I usually get on the phone and explain that the process is in place for their safety, not to be inconvenient. Getting that backup means I have a better chance that they\u2019re going to follow that process, and keep our center more secure.\u2019<\/p>\n<p>In a world of \u2018the customer is always right\u2019, this is something that needs a little more focus. A customer service individual might get nervous when the person on the other end of the line starts getting upset, and could potentially bend or break the rules to make them happy. After all, their entire job is to help give the customer what they want or need, and to have them leave feeling that they had a good experience. Knowing that they can say no when appropriate can keep a business safer.<\/p>\n<p>It\u2019s also important to make sure the staff understands not just what processes are in place, but why they are. Understanding the reason behind a rule is going to make them less likely to break that rule when put in a bad situation. Much like having a supervisor back them up, a reason for the process gives the worker\u2019s action (or inaction) weight and validity, instead of that \u2018why am I even doing this\u2019 feeling. If something doesn\u2019t seem important, it\u2019s much easier to forget or disregard.<\/p>\n<p>Lastly, keep in mind that this education and awareness is ongoing. While it might take some time and money to continually and periodically train employees, it\u2019s nothing compared to what a security breach could cost in the future. Training sessions, testing, and reinforcement are some of the best investments a company can make to keep the social aspect of their security as impenetrable as possible.<\/p>\n<p><strong>About Steven Aiello<\/strong><\/p>\n<p>Steven Aiello is a Senior Systems Engineer with Online Tech, the Midwest\u2019s premier managed data center operator. His certifications include CISSP (Certified Information System Security Professional), \u00a0ISACS CISA, VMware VCP ( VMware Certified Professional), \u00a0Cisco CCNA ( Cisco Certified Network Associate), \u00a0Comptia Security+,and Certified Incident Responder (New Mexico Tech).<\/p>\n<p>Related Links:<br \/>\n<a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/the-latest-it-security-stats-are-you-at-risk\/\">The Latest IT Security Stats: Are You At Risk?<\/a><br \/>\n<a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/solutions-for-the-top-5-security-vulnerabilities\/\">Solutions for the Top 5 Security Vulnerabilities<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Social engineering is an amorphous subject. In essence, the idea is to coerce someone into giving you information and\/or access that, by all accounts, you shouldn\u2019t have. However, the ways that social engineers can maliciously get anything from credit card information to usernames and passwords is almost infinite. And why not use this method? If I had the choice between breaking a door down, or having someone from inside opening it for me, I can assure you it wouldn\u2019t take me long to decide which one to pick. Social engineering in many cases can be easier than trying to break into a system, and could leave the hacker with less fingerprints on the proverbial door-knob. Likely, most people are at this point familiar with Mat Hunan\u2019s story from Wired Magazine. In just half an hour he had all his passwords changed, his phone, tablet, and macbook wiped, as well as his Google account deleted. Goodbye baby pictures of his daughter, and extensive contact list (among many other things). All this because the hacker liked Hunan\u2019s Twitter handle, and wanted to get into the account. The social engineer was able to do this by calling up the support lines of both&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[59],"tags":[],"other_category":[],"class_list":["post-2035","post","type-post","status-publish","format-standard","hentry","category-information-technology-tips"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Social Engineering: Security is a Mindset | OTAVA<\/title>\n<meta name=\"description\" content=\"The ways that social engineers can maliciously get anything from credit card information to usernames and passwords is almost infinite.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/social-engineering-security-is-a-mindset\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Social Engineering: Security is a Mindset\" \/>\n<meta property=\"og:description\" content=\"The ways that social engineers can maliciously get anything from credit card information to usernames and passwords is almost infinite.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/social-engineering-security-is-a-mindset\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2012-09-07T00:00:00+00:00\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/social-engineering-security-is-a-mindset\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/social-engineering-security-is-a-mindset\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"Social Engineering: Security is a Mindset\",\"datePublished\":\"2012-09-07T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/social-engineering-security-is-a-mindset\/\"},\"wordCount\":1201,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"articleSection\":[\"Information Technology Tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/social-engineering-security-is-a-mindset\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/social-engineering-security-is-a-mindset\/\",\"url\":\"https:\/\/www.otava.com\/blog\/social-engineering-security-is-a-mindset\/\",\"name\":\"Social Engineering: Security is a Mindset | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"datePublished\":\"2012-09-07T00:00:00+00:00\",\"description\":\"The ways that social engineers can maliciously get anything from credit card information to usernames and passwords is almost infinite.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/social-engineering-security-is-a-mindset\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/social-engineering-security-is-a-mindset\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/social-engineering-security-is-a-mindset\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Social Engineering: Security is a Mindset\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Social Engineering: Security is a Mindset | OTAVA","description":"The ways that social engineers can maliciously get anything from credit card information to usernames and passwords is almost infinite.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/social-engineering-security-is-a-mindset\/","og_locale":"en_US","og_type":"article","og_title":"Social Engineering: Security is a Mindset","og_description":"The ways that social engineers can maliciously get anything from credit card information to usernames and passwords is almost infinite.","og_url":"https:\/\/www.otava.com\/blog\/social-engineering-security-is-a-mindset\/","og_site_name":"OTAVA","article_published_time":"2012-09-07T00:00:00+00:00","author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/social-engineering-security-is-a-mindset\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/social-engineering-security-is-a-mindset\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"Social Engineering: Security is a Mindset","datePublished":"2012-09-07T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/social-engineering-security-is-a-mindset\/"},"wordCount":1201,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"articleSection":["Information Technology Tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/social-engineering-security-is-a-mindset\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/social-engineering-security-is-a-mindset\/","url":"https:\/\/www.otava.com\/blog\/social-engineering-security-is-a-mindset\/","name":"Social Engineering: Security is a Mindset | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"datePublished":"2012-09-07T00:00:00+00:00","description":"The ways that social engineers can maliciously get anything from credit card information to usernames and passwords is almost infinite.","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/social-engineering-security-is-a-mindset\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/social-engineering-security-is-a-mindset\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/social-engineering-security-is-a-mindset\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"Social Engineering: Security is a Mindset"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2035","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2035"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2035\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2035"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2035"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2035"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2035"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}