{"id":16122,"date":"2020-10-15T08:13:39","date_gmt":"2020-10-15T06:13:39","guid":{"rendered":"https:\/\/www.tecsens.com\/social-engineering-the-great-enemy\/"},"modified":"2021-04-16T11:24:12","modified_gmt":"2021-04-16T09:24:12","slug":"social-engineering-the-great-enemy","status":"publish","type":"post","link":"https:\/\/www.tecsens.com\/en\/social-engineering-the-great-enemy\/","title":{"rendered":"Social engineering the great enemy"},"content":{"rendered":"\n<p>It tends to think that the most dangerous situations and that make organizations more vulnerable, are cyberattacks of viruses, malware, phising etc. That&#8217;s why they <a href=\"https:\/\/www.tecsens.com\/servicios-internet-empresas\/seguridad-informatica\/\" target=\"_blank\" rel=\"noreferrer noopener\">look for tools to deploy<\/a> and protect your information such as firewall, antivirus etc. And sometimes we forget or even don&#8217;t know that<strong> social engineering is the great enemy.<\/strong> And sometimes the great stranger.<\/p>\n\n<h2 class=\"wp-block-heading\"><strong>But what is social engineering?<\/strong><\/h2>\n\n<p>It is a <strong>widely used<\/strong> technique<strong> among cybercriminals,<\/strong><strong> which aims to persuade and<\/strong> manipulate the people of an organization, so that they provide confidential information to you or take a certain <strong>action.<\/strong> A way to deceive the workers of the organization and not the system itself.<\/p>\n\n<p>One of the most significant reasons that explains <strong>why<\/strong> <strong>social engineering is the great enemy,<\/strong>lies in the human being, since it is the weakest piece of this chain. Which makes the employee the most likely to be attacked and puts the organization at risk.<\/p>\n\n<h4 class=\"wp-block-heading\">Among the <strong>main objectives<\/strong> of this practice are:<\/h4>\n\n<ul class=\"wp-block-list\"><li>Obtaining information<\/li><li>Access to a system<\/li><li>Stealing an asset<\/li><\/ul>\n<p>And if we also take into account that there is no system that does not depend on a human being, this makes <strong>social<\/strong> engineering universal and independent of the security solutions implemented.  <\/p>\n\n<p>Thanks to the trust that usually provides users with the means by which they receive such requests or the person making them, they make the victim make the requests without thinking about it.  <\/p>\n\n<p>We all believe that we would be able to respond and recognize practices of this kind, the big problem is that the methods used by cybercriminals are very elaborate and credible. Messages from blocked bank accounts that require verifications are among the most common.<\/p>\n\n<h2 class=\"wp-block-heading\"><strong>What broadcast channels do you usually use?<\/strong><\/h2>\n\n<ul class=\"wp-block-list\"><li>Email<\/li><li>Phone calls<\/li><li>Messaging apps<\/li><li>Social media<\/li><li><em>Dumpster Diving or Trashing:<\/em> search for phone books, storage devices, work schedules etc.<\/li><\/ul>\n<p>Now we can see clearer than the  <strong>cybersecurity not only <\/strong>depends on a set of tools and solutions that are implemented in organizations&#8217; information systems, but is part of a process of  <a href=\"https:\/\/www.incibe.es\/sala-prensa\/notas-prensa\/estafas-mediante-ingenieria-social-riesgo-las-empresas\" target=\"_blank\" rel=\"noreferrer noopener\">training<\/a> and business culture where everyone has to have knowledge and know that at any time we can be vulnerable.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It tends to think that the most dangerous situations and that make organizations more vulnerable, are cyberattacks of viruses, malware, phising etc. That&#8217;s why they look for tools to deploy and protect your information such as firewall, antivirus etc. And sometimes we forget or even don&#8217;t know that social engineering is the great enemy. And [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":15185,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[503,504],"tags":[392,382],"class_list":["post-16122","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-consulting-en","category-it-security","tag-cybersecurity","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Social engineering the great enemy - Tecsens -<\/title>\n<meta name=\"description\" content=\"We know that for organizations the great enemy is social engineering, but do we really know what it is?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tecsens.com\/en\/social-engineering-the-great-enemy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Social engineering the great enemy - Tecsens -\" \/>\n<meta property=\"og:description\" content=\"We know that for organizations the great enemy is social engineering, but do we really know what it is?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tecsens.com\/en\/social-engineering-the-great-enemy\/\" \/>\n<meta property=\"og:site_name\" content=\"Tecsens\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-15T06:13:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-16T09:24:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2020\/10\/Ingenieria-social-03.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1521\" \/>\n\t<meta property=\"og:image:height\" content=\"857\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TECSENS Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Social engineering the great enemy\" \/>\n<meta name=\"twitter:description\" content=\"We know that for organizations the great enemy is social engineering, but do we really know what it is?\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2020\/10\/Ingenieria-social-03.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TECSENS Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.tecsens.com\/en\/social-engineering-the-great-enemy\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/social-engineering-the-great-enemy\/\"},\"author\":{\"name\":\"TECSENS Marketing\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd\"},\"headline\":\"Social engineering the great enemy\",\"datePublished\":\"2020-10-15T06:13:39+00:00\",\"dateModified\":\"2021-04-16T09:24:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/social-engineering-the-great-enemy\/\"},\"wordCount\":365,\"publisher\":{\"@id\":\"https:\/\/www.tecsens.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/social-engineering-the-great-enemy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2020\/10\/Ingenieria-social-03.jpg\",\"keywords\":[\"Cybersecurity\",\"Security\"],\"articleSection\":[\"Consulting\",\"IT Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tecsens.com\/en\/social-engineering-the-great-enemy\/\",\"url\":\"https:\/\/www.tecsens.com\/en\/social-engineering-the-great-enemy\/\",\"name\":\"Social engineering the great enemy - Tecsens -\",\"isPartOf\":{\"@id\":\"https:\/\/www.tecsens.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/social-engineering-the-great-enemy\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/social-engineering-the-great-enemy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2020\/10\/Ingenieria-social-03.jpg\",\"datePublished\":\"2020-10-15T06:13:39+00:00\",\"dateModified\":\"2021-04-16T09:24:12+00:00\",\"description\":\"We know that for organizations the great enemy is social engineering, but do we really know what it is?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/social-engineering-the-great-enemy\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tecsens.com\/en\/social-engineering-the-great-enemy\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tecsens.com\/en\/social-engineering-the-great-enemy\/#primaryimage\",\"url\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2020\/10\/Ingenieria-social-03.jpg\",\"contentUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2020\/10\/Ingenieria-social-03.jpg\",\"width\":1521,\"height\":857,\"caption\":\"Social engineering\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tecsens.com\/en\/social-engineering-the-great-enemy\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.tecsens.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Social engineering the great enemy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tecsens.com\/#website\",\"url\":\"https:\/\/www.tecsens.com\/\",\"name\":\"TECSENS - Empowering companies\",\"description\":\"Sense &amp; Technology\",\"publisher\":{\"@id\":\"https:\/\/www.tecsens.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tecsens.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.tecsens.com\/#organization\",\"name\":\"TECSENS\",\"url\":\"https:\/\/www.tecsens.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png\",\"contentUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png\",\"width\":411,\"height\":85,\"caption\":\"TECSENS\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/tecsens\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd\",\"name\":\"TECSENS Marketing\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g\",\"caption\":\"TECSENS Marketing\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Social engineering the great enemy - Tecsens -","description":"We know that for organizations the great enemy is social engineering, but do we really know what it is?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tecsens.com\/en\/social-engineering-the-great-enemy\/","og_locale":"en_US","og_type":"article","og_title":"Social engineering the great enemy - Tecsens -","og_description":"We know that for organizations the great enemy is social engineering, but do we really know what it is?","og_url":"https:\/\/www.tecsens.com\/en\/social-engineering-the-great-enemy\/","og_site_name":"Tecsens","article_published_time":"2020-10-15T06:13:39+00:00","article_modified_time":"2021-04-16T09:24:12+00:00","og_image":[{"width":1521,"height":857,"url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2020\/10\/Ingenieria-social-03.jpg","type":"image\/jpeg"}],"author":"TECSENS Marketing","twitter_card":"summary_large_image","twitter_title":"Social engineering the great enemy","twitter_description":"We know that for organizations the great enemy is social engineering, but do we really know what it is?","twitter_image":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2020\/10\/Ingenieria-social-03.jpg","twitter_misc":{"Written by":"TECSENS Marketing","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.tecsens.com\/en\/social-engineering-the-great-enemy\/#article","isPartOf":{"@id":"https:\/\/www.tecsens.com\/en\/social-engineering-the-great-enemy\/"},"author":{"name":"TECSENS Marketing","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd"},"headline":"Social engineering the great enemy","datePublished":"2020-10-15T06:13:39+00:00","dateModified":"2021-04-16T09:24:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.tecsens.com\/en\/social-engineering-the-great-enemy\/"},"wordCount":365,"publisher":{"@id":"https:\/\/www.tecsens.com\/#organization"},"image":{"@id":"https:\/\/www.tecsens.com\/en\/social-engineering-the-great-enemy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2020\/10\/Ingenieria-social-03.jpg","keywords":["Cybersecurity","Security"],"articleSection":["Consulting","IT Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.tecsens.com\/en\/social-engineering-the-great-enemy\/","url":"https:\/\/www.tecsens.com\/en\/social-engineering-the-great-enemy\/","name":"Social engineering the great enemy - Tecsens -","isPartOf":{"@id":"https:\/\/www.tecsens.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tecsens.com\/en\/social-engineering-the-great-enemy\/#primaryimage"},"image":{"@id":"https:\/\/www.tecsens.com\/en\/social-engineering-the-great-enemy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2020\/10\/Ingenieria-social-03.jpg","datePublished":"2020-10-15T06:13:39+00:00","dateModified":"2021-04-16T09:24:12+00:00","description":"We know that for organizations the great enemy is social engineering, but do we really know what it is?","breadcrumb":{"@id":"https:\/\/www.tecsens.com\/en\/social-engineering-the-great-enemy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tecsens.com\/en\/social-engineering-the-great-enemy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tecsens.com\/en\/social-engineering-the-great-enemy\/#primaryimage","url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2020\/10\/Ingenieria-social-03.jpg","contentUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2020\/10\/Ingenieria-social-03.jpg","width":1521,"height":857,"caption":"Social engineering"},{"@type":"BreadcrumbList","@id":"https:\/\/www.tecsens.com\/en\/social-engineering-the-great-enemy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.tecsens.com\/en\/"},{"@type":"ListItem","position":2,"name":"Social engineering the great enemy"}]},{"@type":"WebSite","@id":"https:\/\/www.tecsens.com\/#website","url":"https:\/\/www.tecsens.com\/","name":"TECSENS - Empowering companies","description":"Sense &amp; Technology","publisher":{"@id":"https:\/\/www.tecsens.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tecsens.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.tecsens.com\/#organization","name":"TECSENS","url":"https:\/\/www.tecsens.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png","contentUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png","width":411,"height":85,"caption":"TECSENS"},"image":{"@id":"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/tecsens\/"]},{"@type":"Person","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd","name":"TECSENS Marketing","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g","caption":"TECSENS Marketing"}}]}},"_links":{"self":[{"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/posts\/16122","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/comments?post=16122"}],"version-history":[{"count":7,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/posts\/16122\/revisions"}],"predecessor-version":[{"id":22193,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/posts\/16122\/revisions\/22193"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/media\/15185"}],"wp:attachment":[{"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/media?parent=16122"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/categories?post=16122"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/tags?post=16122"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}