Supply chain managers, with contacts with many different companies and access to a variety of financial data, offer a potentially rich target for cybercriminals who want to launch social engineering attacks.
Basically, social engineering attacks manipulate people to inadvertently give up confidential information. Often they target a particular organization, department or individual. They come in the guise of emails, text messages, instant messages, or web sites take encourage the user to click on a link or download a file that will result in malware.
These attacks are common. In fact, 62% of organizations surveyed in the 2015 Cost of Cyber Crime Study published by the Ponemon Institute. And they cause trouble for extended periods of time. On average, for example phishing and social engineering attacks took nearly three weeks to resolve, the survey found.
The infographic below, from electronics distributor Avnet, offers some tips for spotting and foiling social engineering threats.
— Hailey Lynne McKeefry, Editor in Chief, EBN
- Getting Beyond Passwords in the Mobile Supply Chain
- 4 Ways to Secure the Internet of Things
- Add Cybersecurity to Supply Chain Risk List
- Your Supplier’s Inside Threat, Your Security Risk
- 4 Security Challenges That Threaten to Tear Apart the Internet of Things
- Enable Supply Chain Security Through an Authentication Data Network