Cybersecurity guide

Educate your organization on social engineering

Four simple steps

The pen is mightier than the sword in this case, as intelligent hackers are using well-crafted emails camouflaged to appear as if they're from people you know, colleagues, your bank, or even the government

Educate your organization on social engineering

There are several options for how to get the message out about the dangers of social engineering, our collective responsibility to be vigilant, and what individuals can do.

However, the basic things any organization should be looking to establish are as follows:


Ensure all your employees know what social engineering is

It’s a term they have all probably heard somewhere, but they might not all be aware of what the expression encompasses.
Do they know what it means? Do they know what to do if they suspect miscreant activity? Doing a regular check-in with your teams will keep their awareness up and potential for making small mistakes down.


Encourage a trust no-one environment

Social media usage and social networking is now a common and expected practice within any industry. With every company increasing their IT environment with multiple devices, the attack net has been cast wider. If a colleague’s friend on Facebook shares a link with them, unless educated otherwise, they are very likely to click on it without a second thought. They know them, after all.


Teach your colleagues about digital precautions

Hackers are no slouches: they’ve discovered how to make an email look like it’s coming from a reputable person or recognizable business.
Encouraging added scrutiny regarding the actual contents of a message will heighten people’s awareness and make a breach less likely. For instance, if you hover over a link in an email before you actually click, you can look in the bottom left-hand corner of your email client or browser to see where the link is going.


Teach your organization to say no

For as many security attacks as there are these days, you would think that people would be more cautious about their information. But the truth is, people are still waiting to give just about anyone anything they ask for.
Employees take dozens of phone calls and listen to several demonstrations from various vendors each week. During those calls and sessions, the people on the other end of the line are often asking for personal business information or identifiers.


Get the full insight. Read our guide for CISOs & CIOs

Whether you’re a CIO or a CISO, you would undoubtedly kike to see your organization embrace a stronger security culture. Every business today, after all, is entirely dependent on its software: a serious breach can bring your organization to a grinding halt. Read this free guide to find out five simple cultural changes that will make your company more secure.

Read More
Related Content

Case Study

Tachyon: Bridging the IT Security/Operations divide

Forward-thinking Director of End User Computing Rob Peterscheck – responsible for 126,000 end users at a major global healthcare company – discusses the security challenges that come with digital transformation.

On-demand Webinar

Improving the Incident Response Function: SANS 2018 Incident Response Survey Results Part 2

Incident responders are catching and remediating threats faster than ever, according to past SANS surveys. Much of their success can be attributed to improving technologies, such as threat intelligence--73 percent of respondents to last year's survey said they were using…

On-demand Webinar

How Are You Responding to Threats: SANS 2018 Incident Response Survey Results Part 1

What new and continuing threats are responders uncovering in investigations, and how are they dealing with those threats? This webcast will release results from the SANS 2018 Incident Response Survey, developed by Matt Bromiley, SANS Digital Forensics and Incident Response…

Share this post

Share this post on your favourite social media platform.

Find this resource useful?

If so please click here

About 1E

Cyber security is critical. One breach could destroy your organization’s reputation and cost millions of dollars. We take that threat seriously. 1E gives you unprecedented control and visibility over your entire IT estate, delivered at speed and at scale. 1 in 4 of the Top 100 companies by market capital are active 1E customers: we’re working towards a world of proactive cyber security, a world where CIOs and CISOs work together to ensure that no threat can bring down their systems.