Articles by Joe Michalowski
Joe Michalowski covers B2B tech topics including cybersecurity, digital transformation, IT infrastructure, and more.
If you’re trying to improve your cyber defenses, then understanding the threat of social engineering should be a top priority. Studies show that 84% of attackers use social engineering as an important part of their infiltration strategy against both individuals and businesses.
So what exactly is social engineering?
Ransomware, cryptomining, phishing, and denial of service (DoS)—these are the types of cyber attacks that people and businesses have come to fear most in recent years.
However, with all the attention paid to these kinds of high-profile attacks, defending against spyware is becoming less of a concern. The problem is that even now, spyware is still the most common way for attackers to conduct cybercrime against businesses.
In 2017, a man was arrested for stealing $100 million from two tech companies by launching an elaborate cyber attack. He didn’t use ransomware. And he didn’t use some kind of advanced, zero-day malware.
The attacker took an approach that typically gets less attention than the latest and greatest threats — it’s known as spoofing.
You kept your antivirus software up-to-date. You had a firewall in place. Your employees went through all necessary cybersecurity awareness training.
And yet, your company still experienced a security incident. Now, you’re left wondering—what is a zero-day exploit (and how did it get past my cyber defenses)?