{"id":2687,"date":"2017-03-24T14:17:14","date_gmt":"2017-03-24T18:17:14","guid":{"rendered":"https:\/\/www.lindabury.com\/firm\/?p=2687"},"modified":"2021-06-09T12:05:23","modified_gmt":"2021-06-09T16:05:23","slug":"recognizing-avoiding-social-engineering-attacks","status":"publish","type":"post","link":"https:\/\/www.lindabury.com\/firm\/insights\/recognizing-avoiding-social-engineering-attacks.html","title":{"rendered":"Recognizing And Avoiding Social Engineering Attacks"},"content":{"rendered":"<p>A successful New Jersey business recently retained a cyber expert to evaluate the effectiveness of its network&#8217;s <a href=\"https:\/\/www.lindabury.com\/cybersecurity-data-privacy.html\">cybersecurity<\/a>. The expert upgraded the company\u2019s systems and educated its employees on how to recognize, prevent and respond to a cyber-attack. The expert then tested the defenses and was unable, despite multiple attempts, to hack into the company\u2019s network. Satisfied that the network was reasonably secure, he decided to try one last trick. Posing as a friendly client who had an upcoming meeting, he called a receptionist and was given a Wi-Fi password which gave him access to the company\u2019s network and sensitive information.<\/p>\n<p>The good news for the company is that the breach was not real. The bad news is that, despite spending thousands of dollars to bolster its network security, the company\u2019s network was compromised with a simple phone call. This is social engineering at its best.<\/p>\n<p><strong>WHAT IS SOCIAL ENGINEERING?<\/strong><\/p>\n<div class=\"read_more_link\"><a href=\"https:\/\/www.lindabury.com\/firm\/insights\/recognizing-avoiding-social-engineering-attacks.html\"  title=\"Continue Reading Recognizing And Avoiding Social Engineering Attacks\" class=\"more-link\">Continue Reading \u203a<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>A successful New Jersey business recently retained a cyber expert to evaluate the effectiveness of its network&#8217;s cybersecurity. The expert upgraded the company\u2019s systems and educated its employees on how to recognize, prevent and respond to a cyber-attack. The expert then tested the defenses and was unable, despite multiple attempts, to hack into the company\u2019s [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[307,65],"tags":[],"coauthors":[139],"class_list":["post-2687","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-data-privacy-insights","category-insights"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Recognizing And Avoiding Social Engineering Attacks &#8212; March 24, 2017 &#8212; Lindabury, McCormick, Estabrook &amp; Cooper, P.C. Firm News &amp; Events<\/title>\n<meta name=\"description\" content=\"A successful New Jersey business recently retained a cyber expert to evaluate the effectiveness of its network&#039;s cybersecurity. The expert upgraded the\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.lindabury.com\/firm\/insights\/recognizing-avoiding-social-engineering-attacks.html\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Recognizing And Avoiding Social Engineering Attacks &#8212; March 24, 2017 &#8212; Lindabury, McCormick, Estabrook &amp; Cooper, P.C. Firm News &amp; Events\" \/>\n<meta property=\"og:description\" content=\"A successful New Jersey business recently retained a cyber expert to evaluate the effectiveness of its network&#039;s cybersecurity. The expert upgraded the\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.lindabury.com\/firm\/insights\/recognizing-avoiding-social-engineering-attacks.html\" \/>\n<meta property=\"og:site_name\" content=\"Lindabury, McCormick, Estabrook &amp; Cooper, P.C. Firm News &amp; Events\" \/>\n<meta property=\"article:published_time\" content=\"2017-03-24T18:17:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-09T16:05:23+00:00\" \/>\n<meta name=\"author\" content=\"Lindabury, McCormick, Estabrook &amp; Cooper, P.C.\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lindabury, McCormick, Estabrook &amp; Cooper, P.C.\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Recognizing And Avoiding Social Engineering Attacks &#8212; March 24, 2017 &#8212; Lindabury, McCormick, Estabrook &amp; Cooper, P.C. Firm News &amp; Events","description":"A successful New Jersey business recently retained a cyber expert to evaluate the effectiveness of its network's cybersecurity. The expert upgraded the","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.lindabury.com\/firm\/insights\/recognizing-avoiding-social-engineering-attacks.html","og_locale":"en_US","og_type":"article","og_title":"Recognizing And Avoiding Social Engineering Attacks &#8212; March 24, 2017 &#8212; Lindabury, McCormick, Estabrook &amp; Cooper, P.C. Firm News &amp; Events","og_description":"A successful New Jersey business recently retained a cyber expert to evaluate the effectiveness of its network's cybersecurity. The expert upgraded the","og_url":"https:\/\/www.lindabury.com\/firm\/insights\/recognizing-avoiding-social-engineering-attacks.html","og_site_name":"Lindabury, McCormick, Estabrook &amp; Cooper, P.C. Firm News &amp; Events","article_published_time":"2017-03-24T18:17:14+00:00","article_modified_time":"2021-06-09T16:05:23+00:00","author":"Lindabury, McCormick, Estabrook &amp; Cooper, P.C.","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lindabury, McCormick, Estabrook &amp; Cooper, P.C.","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.lindabury.com\/firm\/insights\/recognizing-avoiding-social-engineering-attacks.html#article","isPartOf":{"@id":"https:\/\/www.lindabury.com\/firm\/insights\/recognizing-avoiding-social-engineering-attacks.html"},"author":{"name":"Lindabury, McCormick, Estabrook &amp; Cooper, P.C.","@id":"https:\/\/www.lindabury.com\/firm\/#\/schema\/person\/429b3bd6b52a7aa6eb9a0709bbb4d06f"},"headline":"Recognizing And Avoiding Social Engineering Attacks","datePublished":"2017-03-24T18:17:14+00:00","dateModified":"2021-06-09T16:05:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.lindabury.com\/firm\/insights\/recognizing-avoiding-social-engineering-attacks.html"},"wordCount":1018,"articleSection":["Cybersecurity &amp; Data Privacy","Insights"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.lindabury.com\/firm\/insights\/recognizing-avoiding-social-engineering-attacks.html","url":"https:\/\/www.lindabury.com\/firm\/insights\/recognizing-avoiding-social-engineering-attacks.html","name":"Recognizing And Avoiding Social Engineering Attacks &#8212; March 24, 2017 &#8212; Lindabury, McCormick, Estabrook &amp; Cooper, P.C. Firm News &amp; Events","isPartOf":{"@id":"https:\/\/www.lindabury.com\/firm\/#website"},"datePublished":"2017-03-24T18:17:14+00:00","dateModified":"2021-06-09T16:05:23+00:00","author":{"@id":"https:\/\/www.lindabury.com\/firm\/#\/schema\/person\/429b3bd6b52a7aa6eb9a0709bbb4d06f"},"description":"A successful New Jersey business recently retained a cyber expert to evaluate the effectiveness of its network's cybersecurity. The expert upgraded the","breadcrumb":{"@id":"https:\/\/www.lindabury.com\/firm\/insights\/recognizing-avoiding-social-engineering-attacks.html#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.lindabury.com\/firm\/insights\/recognizing-avoiding-social-engineering-attacks.html"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.lindabury.com\/firm\/insights\/recognizing-avoiding-social-engineering-attacks.html#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"\/"},{"@type":"ListItem","position":2,"name":"Insights","item":"https:\/\/www.lindabury.com\/firm\/insights"},{"@type":"ListItem","position":3,"name":"Recognizing And Avoiding Social Engineering Attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.lindabury.com\/firm\/#website","url":"https:\/\/www.lindabury.com\/firm\/","name":"Lindabury, McCormick, Estabrook &amp; Cooper, P.C. Firm News &amp; Events","description":"Published by Lindabury, McCormick, Estabrook &amp; Cooper","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.lindabury.com\/firm\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.lindabury.com\/firm\/#\/schema\/person\/429b3bd6b52a7aa6eb9a0709bbb4d06f","name":"Lindabury, McCormick, Estabrook &amp; Cooper, P.C.","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a19d0fac94b8d3d657028926f65c841917c5f8f0dd3f23ad394e83f16c690e09?s=96&d=mm&r=g3f2ca7450f0195db092bccff4fb8982e","url":"https:\/\/secure.gravatar.com\/avatar\/a19d0fac94b8d3d657028926f65c841917c5f8f0dd3f23ad394e83f16c690e09?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a19d0fac94b8d3d657028926f65c841917c5f8f0dd3f23ad394e83f16c690e09?s=96&d=mm&r=g","caption":"Lindabury, McCormick, Estabrook &amp; Cooper, P.C."},"sameAs":["https:\/\/www.lindabury.com"]}]}},"yoast":{"focuskw":"","title":"","metadesc":"","linkdex":"","metakeywords":"","meta-robots-noindex":"","meta-robots-nofollow":"","meta-robots-adv":"","canonical":"","redirect":"","opengraph-title":"","opengraph-description":"","opengraph-image":"","twitter-title":"","twitter-description":"","twitter-image":""},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/www.lindabury.com\/firm\/wp-json\/wp\/v2\/posts\/2687","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.lindabury.com\/firm\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lindabury.com\/firm\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lindabury.com\/firm\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lindabury.com\/firm\/wp-json\/wp\/v2\/comments?post=2687"}],"version-history":[{"count":4,"href":"https:\/\/www.lindabury.com\/firm\/wp-json\/wp\/v2\/posts\/2687\/revisions"}],"predecessor-version":[{"id":2724,"href":"https:\/\/www.lindabury.com\/firm\/wp-json\/wp\/v2\/posts\/2687\/revisions\/2724"}],"wp:attachment":[{"href":"https:\/\/www.lindabury.com\/firm\/wp-json\/wp\/v2\/media?parent=2687"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lindabury.com\/firm\/wp-json\/wp\/v2\/categories?post=2687"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lindabury.com\/firm\/wp-json\/wp\/v2\/tags?post=2687"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.lindabury.com\/firm\/wp-json\/wp\/v2\/coauthors?post=2687"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}