We all know the basicsstrong passwords,two-factor authentication, and so on.
We’ve actually shown you some examples of this before.
)Getting into parties and clubs without an invitation?
Most people think that social engineering involves engineering thetarget, and convincing them to give up useful information.
That’s one way to do it, but it’s not the only way.
In fact, the most successful methods involve never letting your target know until it’s too late.
Why You Should Pay Attention to Social Engineering Attacks
Like we mentioned above, passwords are passe.
You’ve probably already readour myriadguides topassword security.
You know toenable two-factor authentication wherever possible(includingLinkedin).
Password security and two factor authentication have been driven into almost all of us.
Rememberthe 1+ billion passwords a Russian gang picked up last month?
Most of those identities are being used for spam, if they’re being used at all.
Given how well it works and how easy it is, that makes us all targets.
Obviously, never give out confidential information.
We went into thisin detail in our old guide to social engineering attacks.
While that post focused on protecting yourself frombeing engineered, it applies here too.
Safeguard even inconsequential information about yourself.
Security questions in particular are usually easy to defeat because they’re systemically flawed.
or “What city did you go to high school in?”
Lie to security questions, and remember your lies.
View every password reset email with skepticism.
Contact support for the service in question and let them know.
Watch your accounts and account activity.
As for your credit,we’ve shown you how to monitor that for free on your ownas well.
Diversify passwords, critical services, and security questions.
Similarly, diversify your cloud storage services, email services, and other critical webapps and web services.
Don’t let one hack, if it ever happens to you, shut down your entire online life.
Keep an eye out.
A little attention to detail and vigilance goes a long way.
Title photo made usingvs148(Shutterstock) andB Studio(Shutterstock).
Additional photos byPerspecsys PhotosandCory Doctorow.