sameer Shah
***** Superb and timely support from Brittany in resolving my MyGlue issue.
sameer Shah
2022-10-27
Richelle Kostiuk
Was having issues with internal emails and they were able to resolve the issue quickly and easily.
Richelle Kostiuk
2022-10-20
Ryan Thomson
Working with IT could easily be one of the most frustrating parts of a remote location job. Foresight For IT has been awesome, they are personable and have a very efficient email system that makes communication and updates a breeze.
Ryan Thomson
2022-10-20
Hether Duff Schwartz
The company I work for has started working with Foresight, and have been amazing in getting things done quickly and efficiently
Hether Duff Schwartz
2022-09-27
Elaine Rusnak
Great company to work with. Proactive. Problems solved in a timely manner. No question goes unanswered. I have learned a lot working with them.
Elaine Rusnak
2022-09-27
Ashleigh Plaine
Foresight it very helpful and quick to respond.
Ashleigh Plaine
2022-09-22
Cheri Wolgien
The team is very knowledgeable and prompt to provide support.
Cheri Wolgien
2022-09-19
Joseph Karpala
Foresight for it Corp - Kenneth was able to solve my access problem. Greatly appreciated. Joseph Karpala Advicoipc.ca
Joseph Karpala
2022-08-19
Lara Han
Always very professional, service is great and always exceptional every time i talked to support. They go above and beyond to ensure things are resolved.
Lara Han
2022-08-17
Shannon Costa
Getting IT support was so simple. A technician contacted me right away and was so fast and helpful. Best IT service I've had.
Shannon Costa
2022-08-17
February 25, 2021

What is Social Engineering?

Do you ever wonder why cyber scams are so effective?

Social Engineering on Metal Gears

While some of these attempts seem so easy to spot for many of us, there are so many that take the bait. To improve their efforts of success, scammers (or at least the good ones) rely on social engineering techniques.

Social engineering is the art of manipulating someone into divulging sensitive information or making critical security mistakes. By incorporating certain words or phrases into their text, email, phone call, or even an in-person conversation, the scammer can greatly increase their chances for a successful attack.

Here are some examples of the common persuasion tactics used by scammers.

Pretexting

Pretexting is focused on crafting a compelling story in hopes that their victim will take the bait. The options are endless but generally the scammer is playing the role of someone needing sensitive information to perform a task. To get the desired information, they ask as series of questions to slowly collect your data. Pretexting can be difficult to spot but before you begin divulging sensitive information verify with the individual who they are and why they need this data.

Authority

It is commonly known that people respond to authority. Scammers use this to enhance the role they are playing by claiming to be a credible expert, law enforcement agent or government official.  Other times, they may pretend to be your supervisor or another top-level executive. By touting their superiority, the scammers generally draw in more victims who only want to comply. Watch for threatening language such as threats to terminate your employment, account suspension or imprisonment for failure to act on their request.

Reciprocity

Reciprocity refers to the social engineering tactic of offering a gift or information. Just like putting bait on a hook, accessing this free “gift” will only lead to despair. Knowing the enticing nature of gifts and free offers, scammers craft their campaign around it. With common lines like, “you’ve been specially selected!” or “you’ve won the grand prize!” the message grabs our attention then shuttles the victim into what they need to do to claim their prize. Remember, if it seems too good to be true, it probably is.

Social engineering tactics have been used for years and will continue, so we must build up our defences. Whenever in doubt, pause and think twice before acting on something or providing information. Hover over any links before clicking and beware of any requests to download a document.

Related posts:
6 Steps Businesses Can Take to Get Their Cybersecurity in Order
Read more chevron_right
Who Handles Cybercrime in Canada?
Read more chevron_right
Cyber Espionage Explained
Read more chevron_right See all blogs chevron_right