Social Engineering & Ransomware
If you were asked to describe a hacker, what image comes to mind? If you’re like most, you are probably picturing unintelligible text ﬂying across a monitor as young men in black hoodies attempt to break into networks, engaging in a very technical dance and speaking in terms the average layperson would not understand. While that may be an apt description of the hacker of yesterday, today one of the most effective means of hacking is surprisingly the least technical. It is called social engineering, and it can be loosely defined as manipulating a person to perform an action or to divulge information.
Rather than trying to break into your computer, the hackers are finding it far easier to simply trick you into handing over login information. A common example of social engineering is a hacker impersonating someone in a position of authority in an attempt to obtain someone’s password.
Subscribe to the CSS Blog
CSS frequently publishes blog posts which are written by our team from their observations in the field, at conferences and through experiences with compliance professionals. These posts are designed to further knowledge and share industry best practices. Topics run the gamut, including Form ADV, cybersecurity, MiFID II, position limit monitoring, technology challenges and more. Complete and submit the brief form below to receive notifications when we publish new content.