Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Best Practices for Enterprises to Prevent Social Engineering Attacks

    Written by

    eWEEK EDITORS
    Published February 10, 2021
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      One of today’s most challenging security issues for the enterprise is stopping social engineering attacks. This is a common entry point for many attackers, and any organization can fall victim. Look at the recent attack on the SANS Institute, and, of course, Twitter. Despite the frequency and potency of social engineering attacks, we often see inadequate security controls as well as incident response plans in place by organizations.

      Every organization will have its own definition of what an acceptable level of risk is and should make strong security decisions and investments backed by their risk threshold. Beyond employee training and education, organizations will want to focus on getting the basics right to ensure there are layers of controls in place to make them more resilient even if their users fall victim to social engineering.

      In this eWEEK article, Associate Vice-President of Consulting Dan Wood at Tempe, Ariz.-based security firm Bishop Fox provides businesses with best practices that can be applied to enforce the strongest possible security posture to help strengthen an organization’s social engineering defensive strategy.

      Here are his most important top tips/best practices:

      Further reading

      • Five Levels of Response Automation for Corporate Cybersecurity
      • Why Security Teams Are Burning Themselves Out

      Best Practice No. 1: Ensure that your organization doesn’t expose itself via open mail relays.

      These can increase email spoofing because they allow unauthenticated email to be sent externally to an organization, which makes it harder to defend against phishing since the emails will look legitimate to internal users.  By implementing strict user authentication and IP authorization at the gateway, you can take this opportunity away from the attacker.

      Best Practice No. 2: Use email filtering processes.

      Some email security controls provide an email filtering capability that provides the ability to strip all external attachments and links to prevent execution and clicking on malicious links with drive-by downloads as well as label external emails with designators such as [EXTERNAL] in the subject line and/or in the body of the email when received or put a colored bar across the email with a warning. This will help reduce the chance of pretexting a victim as an internal user.

      Best Practice No. 3: Analyze suspected email as often as possible.

      Security controls such as Cofense PhishMe provide an email client plug-in called PhishMe Reporter that allows an end-user to submit a suspected phishing email for analysis. It also enables an organization’s SOC to rapidly delete all occurrences of the offending email from user mailboxes to prevent those additionally spread if the phishing campaign is cast with a wide net. Other security controls have similar capabilities and should be reviewed to see what works best for the organization.

      Best Practice No. 4: Educate defenders about attacker tactics.

      If you do fall victim to a social engineering attack, knowing how attackers operate and educating your defenders on these tactics will be helpful when they’re tasked with monitoring the networks and identifying the exfiltration of data.

      More advanced examples based on the maturity of an organization’s defensive posture include:

      Best Practice No. 5: Remove unneeded administrative accounts.

      Remove privileged and administrative accounts where they are absolutely not needed and leverage a just-in-time secrets management system; if an end-user is successfully phished, it reduces how much access rights they could begin with when establishing their foothold.

      Best Practice No. 6: Install a credential check-out process.

      For privileged and administrative accounts, institute a credential check-out process that requires a two-part approval process with justification review and the ability to automatically expire credential access after a set period of time.

      Best Practice No. 7: Deploy user-behavior analytics.

      Establishing user baselines with user and entity behavior analytics (UEBA) to serve as an early alert system if your endpoint controls fail, you may be able to detect an attack based on deviations from these baselines of usage and access patterns.

      Best Practice No. 8: Use machine learning in the SOAR process.

      Similar to above, as you start to generate baselines of activity for users and entities, you can start to enrich your data with intelligence that will allow you to start applying machine learning with technologies and security controls through what is known as security orchestration, automation and response (SOAR). Instead of relying on a human analyst to review potential incidents, there are solutions out there that provide an automated task management approach to repeatable and mundane tasks which allows the analysts to focus on more complicated security issues and investigations. SOAR technologies provide scalability and speed to organizations that have a hard time manually identifying threats and responding to them.

      Best Practice No. 9: Start a no-fault social engineering testing program.

      Lastly, a no-fault social engineering testing program is a good way to test employees via phishing, and other social engineering techniques. Ensure end-user profiles are created with known access rights to which assets and data. Knowing what could be potentially exposed if an end-user is compromised may inform what controls you put in place and where – not all controls are equal for every user. Some users may require unique controls based on their business processes and technical aptitude, while others may not be exposed to critically sensitive information or processes.

      eWEEK EDITORS
      eWEEK EDITORS
      eWeek editors publish top thought leaders and leading experts in emerging technology across a wide variety of Enterprise B2B sectors. Our focus is providing actionable information for today’s technology decision makers.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.