May 26, 2022

At Social-Engineer, LLC (SECOM), we define social engineering as “any act that influences a person to take an action that may or may not be in their best interest.” If you Google “social engineering,” you will get a very different and more negative definition. However, I prefer our definition, with more broad and general terms, because I feel that social engineering is not always negative. Rather, it encompasses how we communicate with our parents, therapists, children, spouses, and others. No matter how you define social engineering, it can be used for good or bad, just like anything else. Because of this, we need to dive into it more deeply to truly understand what it is and how it can be leveraged. By understanding social engineering from the attacker perspective, you’ll be in a better position to protect yourself.

Breaking it Down

There are two major keys to whether a social engineering attack is successful or not that we are going to dive into today:

    1. The attacker perspective, and
    2. Education and security culture at your company.

Attacker Perspective

You may have noticed that “Attacker Perspective” is a keyword in this newsletter’s title. Why is that and what makes it so important? Let’s define it before we discuss. “Attacker Perspective” is defined as “a view of the world where every piece of information can be used for personal gain or leveraged to achieve a desired goal.” When I think of Attacker Perspective I think of these guys:


Read more…

Leave a Reply

Your email address will not be published.