Skip to Main Content

Superbe nouvelle! Nous migrons vers un nouveau site Web; au cours des prochains mois, vous pourriez voir un mélange de pages nouvelles et anciennes.

[et_pb_section fb_built="1" fullwidth="on" _builder_version="4.0.4" background_image="" inner_width_tablet="50px" inner_max_width_tablet="50px" custom_margin="-75px|||" custom_padding="||||false|false" z_index_tablet="500" hover_enabled="0" locked="off"][et_pb_fullwidth_header title="This is not just any article about Quid Pro Quo" subhead="By Bill Dunnion" text_orientation="center" background_overlay_color="rgba(0,0,0,0.3)" _builder_version="4.0.4" background_enable_color="off" custom_padding="100px||||false|false" hover_enabled="0"][/et_pb_fullwidth_header][/et_pb_section][et_pb_section fb_built="1" _builder_version="3.22"][et_pb_row _builder_version="3.25" background_size="initial" background_position="top_left" background_repeat="repeat"][et_pb_column type="4_4" _builder_version="3.25" custom_padding="|||" custom_padding__hover="|||"][et_pb_text _builder_version="4.0.4" z_index_tablet="500" text_text_shadow_horizontal_length_tablet="0px" text_text_shadow_vertical_length_tablet="0px" text_text_shadow_blur_strength_tablet="1px" link_text_shadow_horizontal_length_tablet="0px" link_text_shadow_vertical_length_tablet="0px" link_text_shadow_blur_strength_tablet="1px" ul_text_shadow_horizontal_length_tablet="0px" ul_text_shadow_vertical_length_tablet="0px" ul_text_shadow_blur_strength_tablet="1px" ol_text_shadow_horizontal_length_tablet="0px" ol_text_shadow_vertical_length_tablet="0px" ol_text_shadow_blur_strength_tablet="1px" quote_text_shadow_horizontal_length_tablet="0px" quote_text_shadow_vertical_length_tablet="0px" quote_text_shadow_blur_strength_tablet="1px" header_text_shadow_horizontal_length_tablet="0px" header_text_shadow_vertical_length_tablet="0px" header_text_shadow_blur_strength_tablet="1px" header_2_text_shadow_horizontal_length_tablet="0px" header_2_text_shadow_vertical_length_tablet="0px" header_2_text_shadow_blur_strength_tablet="1px" header_3_text_shadow_horizontal_length_tablet="0px" header_3_text_shadow_vertical_length_tablet="0px" header_3_text_shadow_blur_strength_tablet="1px" header_4_text_shadow_horizontal_length_tablet="0px" header_4_text_shadow_vertical_length_tablet="0px" header_4_text_shadow_blur_strength_tablet="1px" header_5_text_shadow_horizontal_length_tablet="0px" header_5_text_shadow_vertical_length_tablet="0px" header_5_text_shadow_blur_strength_tablet="1px" header_6_text_shadow_horizontal_length_tablet="0px" header_6_text_shadow_vertical_length_tablet="0px" header_6_text_shadow_blur_strength_tablet="1px" box_shadow_horizontal_tablet="0px" box_shadow_vertical_tablet="0px" box_shadow_blur_tablet="40px" box_shadow_spread_tablet="0px"]

So, before you think I'm about to embark down some dark path of political rants, I can assure you I have no interest nor desire to do so. Instead, as 2019 comes to an end, I thought it best to embark instead down a path of education as it pertains to a very real, and very prominent cyber security threat: Social Engineering.

Needless to say, we are all creatures of habit. And collectively as a global society we are used to habits, social cues, and everyday common interactions that for the most part govern our days. This is where the concept of Social Engineering rears its ugly head—a collection of tricks and tools that the bad guys use to take advantage of good people and companies.

As a primary example, there is Quid Pro Quo. And again, though that phrase seems to have been made popular in US news cycles of late, this is altogether different. In a Quid Pro Quo scenario, the scam involves a trade of some sort—one that appears as something mutually beneficial.

The best example is that of receiving a call for tech support. By now, I'm sure you have received at least one call from the "Microsoft Support Team" claiming your PC is infected and must be fixed. The Quid Pro Quo here is the handing over of controls to the stranger on the phone in hopes that person will fix the supposed issue. The best advice here: tech support, unless it’s someone calling from within your own organization, usually does not reach out to anyone. Ignore these scams by hanging up.

Another example of Social Engineering is something referred to as Vishing (the voice version of Phishing). With Vishing, bad guys will pose as a coworker by calling a target to ask for login credentials or something else that could be potentially shared.

Vishing can come in two types: first, there are one-off scams known has Hunting, where a perpetrator will try to get as much information as possible in one shot. Second, there are the scams that take place over several interactions, referred to as Farming. In either case, it’s safe to say that one should never give away any details to strangers, either on the phone or otherwise.

Another prime example is that of Pretexting. This one is simple but, unfortunately, effective. It's simply a ploy that gets you to interact with an email, usually in the form of a beneficiary scenario, etc. The victim, to receive what has been left to them, must give personal information to "verify" the transaction.

An all too common Social Engineering scam is Email Hacking and Contact Spamming. This one is extremely common in that hackers will simply break into and commandeer someone’s email account to then spam that person’s contacts. Because the email is familiar, the chances of people falling for that scam increases exponentially.

The best way to avoid these is to be critical of things such as grammar, sentence style, and so on—if it sounds like your friend has partaken in too much holiday cheer, then it's probably a scam. Additionally, look at links or attachments that may be out of the ordinary. If it's not something your contact would usually send, pick up the phone and call them directly at the number you have in your files to ask if it's really them.

And, as a last example, there is a great scam called Baiting. The best example of this one is that a hacker will place some nefarious code on a USB drive and leave it in a public place (usually outside an office building on a bench, table, etc.). To use the USB drive as bait, they will label it with something like “bonuses," or CEO Salary Files, or something that will get a person’s curiosity peaked. Of course, the moment it's plugged in, the code downloads and infects that device and network. The best advice here, if curiosity killed the proverbial cat, don't be a curious cat.

Social Engineering is a terrible thing—a way for the bad guys to prey on the trusting nature of good people. The best defense is to educate yourself, use common sense, and channel your inner Sherlock Holmes’ qualities and find a sidekick to help you identify the crime before it happens.