Social Engineering & Ransomware

If you were asked to describe a hacker, what image comes to mind? If you’re like most, you are probably picturing unintelligible text flying across a monitor as young men in black hoodies attempt to break into networks, engaging in a very technical dance and speaking in terms the average layperson would not understand. While that may be an apt description of the hacker of yesterday, today one of the most effective means of hacking is surprisingly the least technical. It is called social engineering, and it can be loosely defined as manipulating a person to perform an action or to divulge information.

Rather than trying to break into your computer, the hackers are finding it far easier to simply trick you into handing over login information. A common example of social engineering is a hacker impersonating someone in a position of authority in an attempt to obtain someone’s password.

Want to read more?

Fill in the form below to download the full article.

Loading form...

Latest Content

Regulation Best Interest, Cybersecurity Top Concerns at IAA 2019 Compliance Conference

The Investment Adviser Association (IAA) represents the interests of investment advisers in Washington D.C., and the IAA Investment Adviser Compliance Conference 2019 was a forum for the discussion of future potential rulemaking. Cybersecurity and Fiduciary Rule considerations were headline topics, with custody and marketing right behind. The following is a summary of key issues discussed … Continued