Valor Technologies Blog

Valor Technologies has been serving the Wisconsin area since 2005, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses.

Why are you so popular?

Most people are aware of the many scams that exist on the internet now. It’s tough to simply look at your emails without noticing several phishing emails sitting in your inbox, and those are just the obvious ones! Then, there’s, “We need you to update your account info, just click the link below,” emails. It can even go deeper with hackers physically talking with you or conning you into giving them information you shouldn’t. Lately, the largest influx of scams has come from social media.  As of right now, worldwide social media users total 2.34 billion according to Statista. That is a lot of people to target.

0 Comments
Continue reading

Breaking Down Social Engineering

Most people are aware of terms like phishing and malware, but did you know those are a part of a larger scheme called social engineering? This is not a new kind of fraud. In fact, it’s been used for many years to manipulate a wide range of people into giving up important data about themselves or their workplace. A prime example of social engineering goes back to Greek mythology with the Trojan horse. They infiltrated the city of Troy with a “peace offering” filled with soldiers, thus winning the war. With technology at the forefront of our lives, social engineering has entered a new era. Physical human interaction is not necessarily required anymore. These criminals can gain information through emails, pop-ups and public Wi-Fi networks, to name a few. The main objective is to influence, manipulate or trick users into giving up privileged information or access within an organization. They are doing this right under your nose, and if you’re not paying attention you might be a victim of this, as well.

 

0 Comments
Continue reading