Please update your browser.

Our site no longer supports this browser. Using another one will help provide a better experience.

Menu

Security

Are you the weakest link in your cybersecurity?
February 6, 2020

How to protect yourself from social engineering 

 

A common misconception people have about cyber attackers is that they only use advanced hacking tools and technology to break into people’s computers, accounts and mobile devices. This is simply not true. Cyber attackers have learned that one of the easiest ways to steal your information or hack your computer is by simply talking to and misleading you. This is called social engineering.

Social engineering is a type of psychological attack in which hackers trick you into giving them something they want. Social engineering attacks can happen with almost any technology, including phishing attacks via phone calls, email, text messaging, Facebook messaging, Twitter posts, or online chats. The key is to know the signs. Learning how to prevent, detect, and stop social engineering attacks is one of the most effective steps you can take to protect yourself.

What can you do?

Use common sense. If something seems suspicious or does not feel right, it may be an attack. Some common indicators of a social engineering attack include:

  • Someone creating a tremendous sense of urgency. If you feel like you are under pressure to make a very quick decision, be suspicious.
  • Someone asking for information they should not have access to or should already know.
  • Something too good to be true. A common example: You are notified you won the lottery even though you never bought a ticket.

Here are some tips to help prevent social engineering attacks:

  • Never share passwords: No CenturyLink organization will ever contact you and ask for your password. If someone is asking you for your password, it is an attack.
  • Don’t share too much: The more an attacker knows about you, the easier it is for them to trick you into doing what they want. Small details shared about yourself, over time, can be put together to gain access to your accounts, financial data and other sensitive information. The less you share publicly, including posts on social media sites, product reviews, or public forums and mail lists, the less likely you will be attacked.
  • Verify contacts: At times, you may be called by your bank, credit card company, mobile service provider, or other organizations for legitimate reasons. If you have any doubt as to whether a request for information is valid, ask the person for their name and extension number and offer to call them back. Be sure to use a phone number you have gotten from a trusted source.

If you suspect someone is using a social engineering method to get something from you, stop communicating with the person. If it is someone calling you on the phone, hang up. If it is someone chatting with you online, terminate the connection. If it is an email you do not trust, delete it.