Are Cybersecurity Speakers The Best Defence Against Social Engineering?

Megan Lupton
Digital Copywriter
Cybersecurity Speaker

As it is Cybersecurity Awareness Month, let's explore methods to prevent one of the most common and dangerous types of malicious attacks - social engineering.

Is social engineering a cybersecurity threat?

In short, yes. This type of attack is highly successful, as no matter how many defences a company employs, it is difficult to ensure that all employees will practice safe information security measures.

Social engineering attacks have been on the rise, with 55% of all emails being reported as spam and 97% of malicious attacks targeting human error. By manipulating users into downloading dangerous links, hackers can gain unauthorized access to business and personal information. From there, they can hold the data ransom, which has cost victims $5 billion worldwide from 2013 to 2016.

Social engineering is reliant on successful manipulation, where hackers trick people into giving them access to vital personal data or allow them to download malicious software. The cyber threat takes advantage of people's trustworthy nature, by structuring the email or phone call to sound like it has come from an official member of a trusted company.

How To Prevent Social Engineering

Due to the nature of social engineering, preventing it requires education and training, usually led by a cybersecurity expert. The best way to defend your business against malicious attacks is to book a cybersecurity speaker, who can offer tried and tested methods to avoid falling victim. These speakers are professionals in their own right, having established a career in cyber-technology before touring the speaking circuit. Due to this, you can rest assured that the safety of your business is in the hands of an expert.

Our Pick Of The Best Cybersecurity Speakers:

1. Dr Victoria Baines - Principal Analyst at a cybersecurity agency.

2. Keren Elazari - Internationally renowned cybersecurity corporate consultant.

3. Christopher Wylie - Uncovered the Cambridge Analytica scandal.

4. Lisa Forte - Founded a cybersecurity consultancy firm.

5. Jessica Barker - Studies the psychology and sociology behind cybersecurity.

6. Theresa Payton - Founded a "team of cybercrime fighters".

7. Jamie Woodruff - World-renowned ethical hacker.

8. Misha Glenny - Published novels on historical cybercrimes.

9. Graham Cluley - Online journalist specialising in cybersecurity.

10. Baroness Joanna Shields OBE - AI and cybersecurity expert.

For a comprehensive list of the leading cybersecurity speakers available to book, check out our blog post.

Investing in training workshops and educational presentations will reduce the risk of successful social engineering attacks on your company. Capable of discussing the warning signs of a potential attack and the course of action employees should employ, cybersecurity speakers are the best defence against social engineering.

What are examples of social engineering?

Social engineering can come in several forms, making them hard to decipher and avoid. And what's worse is that every day more methods are being developed by hackers. As hackers seek out vulnerable individuals and company, they expose their weaknesses to gain access. Whether they are targeting bank accounts, social security numbers or professional data, hackers either strike a large number of companies in one email or tailor the attack to a single victim.

Phishing:

Phishing attacks, or vishing if it is done over the phone, are arguably the most common form of social engineering, with nearly all companies experiencing a malicious email at some point. Disguised as a legitimate email, the content exploits the trustworthy nature of an employee by being written from a "trusted source", in a frantic tone. The message normally requires "urgent action", is difficult to detect and can be strengthened through pretexting.

Baiting:

Not all examples of social engineering are through digital forms of communication, hackers also use physical media to attack victims. By fashioning infected flash drives as company property, employees are likely to insert them into their computer and give the hackers access, out of curiosity or concern. The "bait" looks authentic and inviting, by being labelled as "Confidential" or containing "Bonuses".

Quid Pro Quo:

Quid Pro Quo relies on a perceived give and take, where the victim expects something in return for handing over details. A hacker may contact an employee of a company offering IT support in return for the valuable login details to a company's website, which would give them access to lock the site, hold it ransom or access client data. The victim believes that it is an authentic, fair exchange.

Scareware:

Scareware is a two-pronged attack. Firstly, a hacker will influence someone to believe that they have a malware infection, then offer them a dangerous software to resolve the fabricated issue. Usually tricked through a popup on their PC or a website, Scareware relies on people's fear of cyber threats.

Malicious attacks can come in many forms, and usually, appear to be from a trusted source - either a friend, professional advisor, a coworker or the boss of a company. No matter how many technical defences a company has, hackers use social engineering to take advantage of human error, which is usually easier to manipulate.

Book A Cyber Security Speaker

To book a cybersecurity speaker, and ensure that your business defends against social engineering, contact us by filling in our online contact form or by calling a booking agent directly on 0207 1010 553.