• onslaught545@lemmy.zip
    link
    fedilink
    English
    arrow-up
    20
    ·
    4 days ago

    Yup, it is. Social engineering is by far the most effective means of gaining unlawful access to any system.

    Humans are always the weakest link.

    • sugar_in_your_tea@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      11
      ·
      4 days ago

      Exactly. Many breaches follow this pattern:

      1. Learn the name and some basic details about the secretary or something
      2. Call corporate tech support asking for a password reset claiming to be the secretary
      3. Access important stuff since secretaries have a surprising amount of access

      Replace “secretary” with some other relevant individual who has a surprising amount of access and wouldn’t attract attention.