5 Ways Hackers Can Socially Engineer Your Staff

Open lock in a series of digital locks.
Open lock in a series of digital locks.

In August of 2012, on a hot day in Las Vegas, a recently hired Walmart manager of government contract logistics spent 20 minutes on the phone with the store manager in a remote military town in Canada. During those 20 minutes, the logistics manager took down vital information from the store manager in preparation for a big government contract: the store’s management schedule, their janitorial and cafeteria food contract providers, even the type of computer system the store manager used and what antivirus software it had installed. The only problem is that the there was no government contract logistics manager. The call was part of a contest run by the hacker convention DefCon, and in 20 minutes, a contestant managed to get every piece of information he needed to rob the store, sell to competitors, or infiltrate their computer systems using nothing but a telephone and a few hours of research. This is social engineering, and hackers are increasingly using it to infiltrate businesses and steal their secrets for personal gain. Here’s what they’re doing and how to protect your company: 1.Protect Personal Contact Information — It’s good to put a public face on your company, but protect the private internal email and other contact information of senior employees. That contact info can be used to impersonate them. 2.Give Information on A-Need-To-Know Basis — In the Walmart story, the information came from a store manager, but usually it’s a much lower employee who is infiltrated. Compartmentalize sensitive information to keep it from escaping. 3.Formalize Information Channels — Sharing company secrets should never be done informally. Make sure a formal plan is in place for procedures on sharing company information. Social engineers will try to exploit informal structures to get more than they otherwise could. 4.All Information Is Private Information, Or None Is — To a dedicated social engineer, even tiny pieces of private information can add up. Make sure you, as well as your staff, are aware that any information shared can go public quickly. Don’t share anything with anyone outside of the company that you wouldn’t feel comfortable putting on the front page of the New York Times. 5.Record Outbound Contact — Because you can be sure that any social engineer working on your company is recording it also. Be sure to audit this record regularly to make sure that information is not getting out. This should include phone calls, emails, text messages, and similar.

Corsica Technologies
Corsica Technologies is a strategic technology partner specializing in consulting and managed services. With an integrated team of experts in cybersecurity, IT services, AI solutions, digital transformation, EDI, and data integration, Corsica offers comprehensive coverage and unlimited service consumption for one predictable monthly price—whether fully managed or co-managed.

Related Cybersecurity and IT Reads

Introducing Corsica's Director of AI Innovation
AI
Wes Dekoninck

Introducing Corsica’s Director of AI Innovation

At Corsica Technologies, we recently introduced a new executive role: Director of AI Innovation. This role represents a deliberate investment in helping our clients move beyond experimentation with artificial intelligence and into real, sustainable value through AI consulting and solutions. 

Read more
Microsoft Copilot Wave 3 - Corsica Technologies
AI
Brian Harmison

The Power of Microsoft 365 Copilot Wave 3

Copilot Wave 3 is the latest release cycle for Microsoft’s market-leading enterprise AI solution. With agentic capabilities, governance of AI agents, and agentic workflows embedded in M365 apps, Wave 3 is a major shift that turns Copilot into a governed

Read more
What are managed IT services? - Corsica Technologies
Managed IT Services
Garrett Wiesenberg

What Are Managed IT Services?

💡 EXCLUSIVE Resource:  Managed IT Services Pricing Calculator Calculate Your Pricing Managed IT services are outsourced services offering proactive IT management and day-to-day support. They help organizations maintain stable technology systems and infrastructure aligned with business goals. While that sounds

Read more

Sign Up For Our Newsletter

Stay up-to-date on the Managed Services and Cybersecurity landscape, and be the first to find out about events and special offers.

Ready to talk to an expert?

We’ll respond within 1 business day, or you can grab time on our calendar.