Social Engineering Blogs

An Aggregator for Blogs About Social Engineering and Related Fields

Security Metrics Blog November 5, 2014

Nature’s 7 Hacker Defense Mechanisms

What businesses can learn from armadillos, seahorses, and zebras. Giles Witherspoon-Boyd, PCIPBy GilesWitherspoon-BoydHackers are a lot like predators in the wild. After finding an unsuspecting animal, nature’s hunters test their victim for weaknesses before taking it down. Just like nature’s hunters, hackers aren’t looking for a challenge. They’re looking for an easy target. Unfortunately, it seems as if hackers are always one step ahead. So how do you avoid becoming dinner? Take a clue from nature. It’s all about defense mechanisms.Tweet: Take a clue from nature: Defeating hackers is all about defense mechanisms. http://bit.ly/1x2qT6c #PCI #infosecTweet1. The LookoutDwarf mongoose post sentries that stand on their hind legs to watch for birds (their main predator). When a bird is sighted, they send a warning call to others and run to safety. Just like the sentries that stand outside dwarf mongoose burrows, businesses have file integrity monitoring software, or log monitoring. Log monitoring systems collect and store logs. Logs are user actions inside an operating system (e.g., renaming a file, opening an application). Some systems have a real-time reporting system (like the dwarf mongoose call) that alerts you via email or text of suspicious activity.Reviewing logs on a regular basis helps identify malicious attacks on your system. According to the PCI DSS, businesses are supposed to have 12 months of logs stored, with 3 months readily available. Systems that have log monitoring capabilities include operating systems, Internet browsers, point of sale systems, firewalls, and intrusion detection systems (IDS). Some systems do not automatically enable logging (e.g., Windows XP out of the box has logging turned off).2. The UpgraderIn the animal kingdom, bigger is often better. A larger, stronger set of antlers helps white-tailed bucks successfully battle other males during mating season. Every year, they shed their antlers to grow bigger ones for next season.Just like deer upgrade their antlers, you should be regularly updating your software to make sure it has the most up to date patches for security vulnerabilities. Devices and software that should be regularly updated include: operating systems, anti-virus software, POS terminals, firewalls, intrusion detection systems (IDS), mobile devices, Internet browsers, app software, and more. 3. The HiderEveryone knows that chameleons change colors to match their environment and allow attackers to pass them over. But so do seahorses, cuttlefish, octopus, and dozens of other animals. Changing colors is a great defense mechanism for animals without strength or stamina. Just like these animals hide their vulnerable bodies, it’s important for you to hide what’s most important to your business: customer credit card data. Did you know 63% of businesses store unencrypted card data? If a credit card isn’t encrypted, it’s completely exposed on your network, with no camouflage protecting it from predators snooping around. Encryption is the best way to hide data, but by finding and deleting unnecessary data, you have nothing to hide. After all, hackers can’t steal what isn’t there.4. The TankSome animals undergo structural changes to protect their bodies from predators. Take the thick skin of the armadillo. It’s made of an armor-like substance and can roll into an indestructible ball if the armadillo is threatened. The structural change businesses should use to protect their business is a firewall, both software and hardware. Like a security guard, properly configured firewalls control what goes in, and what comes out of your business. SEE ALSO: How Does a Firewall Protect a Business?5. The TricksterZebras use their striped pattern as an optical illusion to confuse predators. Because each zebra has a unique striped pattern, it’s difficult for predators to single one out. Businesses should apply the zebra strategy to passwords. Each network, device, and user should have a unique username and password. In addition, make sure each of those unique passwords are difficult to guess. The easiest way to create a tricky password is by creating a passphrase. Anyone love Corey Hart’s 1980’s hit, “I wear my sunglasses at night”? If you do, good. If not, too bad. It’s turning into my example passphrase. To create a complex passphrase, take the first letter of each word, and substitute special characters/numbers where you can. I wear my sunglasses at night –> Iwmsg@n1980!6. The TeacherIn a recent study on lion cubs, researchers learned lions aren’t born with a natural fear of humans. They learn it from their mothers and the rest of the pride. For a species like lions to continue to prosper, their defense mechanism is to quickly teach their young to avoid other species that could harm them…aka humans.Training is such a crucial security strategy. I can’t count how many compromises could have been prevented if staff were simply educated on the dangers of hackers. Business owners, IT staff, and managers must train staff members on physical security, phishing, passwords, policies, etc. so they can take the necessary steps to protect the business. 7. The IntimidatorHave you ever seen a lizard do a pushup? Those lizards are showing their strength to intimidate predators. Do you know the reason gazelles jump so high? It’s to demonstrate their ability to outrun pursuers. You know those lizards that flare extra skin around their neck when they are threatened? By doing so, they appear larger and more threatening to those that may try to eat them.With nothing but their body language, animals signal to predators, “Attacking me is not worth your time. So don’t even try.”While it’s difficult to show to a hacker just how strong your business security posture is, the best way all-around way to maintain solid security is by complying with the PCI DSS. That means going through each section of the Self-Assessment Questionnaire (SAQ) and ensuring your organization’s compliance with all the requirements.SEE ALSO: Which PCI SAQ is Right for My Business?If you liked this post, please share!Giles Witherspoon-Boyd (PCIP) is Enterprise Account Manager at SecurityMetrics and assists businesses in defining their PCI DSS scope. Follow him on Twitter and check out his other blog posts.

Filed Under: PCI, Security

The Humintell Blog November 3, 2014

Why Do We Cry?

Click here to view the embedded video.

For past blogs related to tears and crying, see below

Crying without tears

Emotional Outpour

Why Humans Like to Cry

Emotion Overload: Crying on Planes

Filed Under: Nonverbal Behavior, Science

The Influence People Blog November 3, 2014

Influencers from Around the World – One Great Question to Ask: Lessons from Marshall Goldsmith and Patrick Lencioni

This month the “Influencers from Around the World” post comes all the way from South Korea thanks to Hoh Kim. Hoh and I met in Arizona early 2008 when we went through training together to earn our Cialdini Method Certified Trainer designations. To learn more about Hoh visit his website, The Lab h, and his blog, Cool Communications. You can also find Hoh on Facebook, LinkedIn and Twitter.Brian Ahearn, CMCT® Chief Influence Officer influencePEOPLE Helping You Learn to Hear “Yes”.One Great Question to Ask: Lessons from Marshall Goldsmith and Patrick LencioniHow you communicate your weaknesses can define whether you’re trustworthy or not, according to Robert Cialdini, Ph.D., the world’s foremost expert on the science of influence. Without trustworthiness, we cannot have true authority in the eyes of others. Many leadership experts also express a similar concept.Everyone talks about the importance of trust. But, do we know how to act to build trust as a leader? Patrick Lencioni, the author of The Five Dysfunctions of a Team, shared some excellent insight. According to Lencioni, when we use the word “trust,” it normally means “predictable trust.” For example; I know one of my team members will do a good job, as she or he has been a good performer in the past. However, Lencioni suggested that leaders should practice what he called “vulnerability-based trust.” Leaders cannot be strong in every aspect, which means they also have weaknesses. Leaders should first know what their weaknesses are, and they should feel comfortable disclosing them to their team. Leaders shouldn’t be defensive. Instead Lencioni wrote, “In essence, teammates must get comfortable being vulnerable with one another.”Everyone talks about the importance of feedback in developing people. However, Marshall Goldsmith, one of the noted experts in leadership development, emphasized the importance of “feedforward.” Feedback is about your behavior in the past and feedforward is about suggestions for the future behavior. Feedback is in the rear view mirror, while feedforward is looking into the windshield. To drive your car you have to pay attention to windshield, what lay ahead, not the rear view mirror, which only shows what is behind.We all have areas of improvement in our workplace. If you could choose one area for improvement over the next year, what will it be? Better listening? Faster decision-making? Better emotional management? Whatever it is, acknowledge your weaknesses to your team members. You won’t be seen as a loser. If you stay in your weaknesses you might be viewed as a loser but when you acknowledge a weakness candidly, and ask for feedforward from your members and colleagues, you will be seen as a more trustworthy individual. When you acknowledge weaknesses and ask for feedforward you make a public commitment to improve. By utilizing the principle of consistency, one of the Dr. Cialdini’s six principles of influence, you will have a better chance to actually experiencing progress.How do you ask for feedforward? Take the Marshall Goldsmith’s advice and simply say, “I want to be better at (listening, for example). How can I be a better listener?” If your colleagues suggest something, don’t defend yourself, just respond with a sincere, “Thank you.” As we approach the end of 2014, it is a good idea to practice feedforward with you wife, husband, or significant others. Do you want to be a better spouse? Let me share one of my secrets to be a better spouse. Once a year I ask to my wife, “Honey, how can I be a better husband? What can I do better to be a better husband?” So far, my wife has never asked me to buy her things like a diamond ring or luxury clothing or high-end handbags. She just loves to be asked.Hoh Kim, CMCT® Founder, Head Coach & Lead Facilitator, THE LAB h www.THELABh.com

Filed Under: Hoh Kim, Influence, Science

  • « Previous Page
  • 1
  • …
  • 267
  • 268
  • 269
  • 270
  • 271
  • …
  • 559
  • Next Page »

About

Welcome to an aggregator for blogs about social engineering and related fields. Feel free to take a look around, and make sure to visit the original sites.

If you would like to suggest a site or contact us, use the links below.

Contact

  • Contact
  • Suggest a Site
  • Remove a Site

© Copyright 2025 Social Engineering Blogs · All Rights Reserved ·