Cyber Security

Effective Tips to Prevent Social Engineering Attacks

Even large enterprises fall victim to cyberattacks, despite robust network security. Malicious attacks are expensive, and they also disrupt operations and damage a company’s reputation. A recent breach at Uber is a reminder of how social engineering attacks are on the rise. According to the ride-sharing company, the hacker was affiliated with the Lapsus$ cybercrime group that conducted similar attacks on the networks of Cisco, Okta, and Microsoft. So, how do you prevent social engineering attacks? In this article at the Information Age, Aaron Hurst sheds light on how Uber got hacked and explains the measures to prevent cyberattacks.

How Did Hackers Gain Access to Uber’s Internal System?

The Uber security protocol would have probably been enough to prevent the data breach if it were not for the use of social engineering. Social engineering attacks often use human emotions to get the victim to perform an action or give hackers the required information. According to the New York Times report, the threat actor gained access through Twitter, tricking an Uber staff member into giving them login credentials to access the company’s Slack channel.

Ways to Prevent Social Engineering Attacks

Create Cyber Awareness Training Programs: Building cyber awareness training will help your employees recognize the common methods hackers implement to breach your organization’s sensitive data. This will undoubtedly help you prevent social engineering attacks.

Regularly Test Your Network Vulnerabilities: Regular vulnerability assessments will ensure the safety of your organization’s private data. Your security assessment report must include discovered vulnerabilities, a walkthrough of what was done, and solutions to better protect your organization.

Be Aware of Multifactor Authentication Exploitation Methods: Some MFA methods are more vulnerable to compromise than others. To prevent social engineering attacks, your IT teams must compare your current MFA processes against common exploit tactics. Ensure the security team upgrades the complexity of authentication protocols to mitigate exploitation.

To read the original article, click on

Related Articles

Back to top button

We use cookies on our website

We use cookies to give you the best user experience. Please confirm, if you accept our tracking cookies. You can also decline the tracking, so you can continue to visit our website without any data sent to third party services.