Security Basics mailing list archives
Steps to avoid Social Engineering
From: Tabs The Cat <tabsthecat () gmail com>
Date: Mon, 18 Apr 2005 14:39:07 -0400
Hello y'all, I have a question for you guys (and gals). We all know about social engineering. Some of us use it on a daily basis. And we all know how it can be even more dangerous than any computerized attacks, but how can we protect against it? I'll give you an example: we have a database based program that was written by and maintained by a third party that is in another city. In the past when they needed access for maintenance, we would provide them it via VPN. Recently there has been a problem so they were contacted. Earlier today someone from that company phoned me to discuss details about the VPN. I haven't given them any information yet. In this case I am fairly positive it is legit since they knew the company that we use as well as who lodged the complaint. But how could I get this person (or any one in the future) prove to me that they are the people who are they say they are? Any advice? Tabs
Current thread:
- Steps to avoid Social Engineering Tabs The Cat (Apr 18)
- Re: Steps to avoid Social Engineering Cd Pirate (Apr 19)
- Re: Steps to avoid Social Engineering Micheal Espinola Jr (Apr 20)
- Re: Steps to avoid Social Engineering Dave Peters (Apr 21)
- RE: Steps to avoid Social Engineering J B (Apr 19)
- Re: Steps to avoid Social Engineering T. Shannon Gilvary (Apr 19)
- Re: Steps to avoid Social Engineering David Roman Esteban (Apr 19)
- RE: Steps to avoid Social Engineering David (Apr 19)
- Re: Steps to avoid Social Engineering Times Enemy (Apr 20)
- RE: Steps to avoid Social Engineering Aruna (Apr 19)
- RE: Steps to avoid Social Engineering Patoff Pat-EtHiQ (Apr 19)
(Thread continues...)
- Re: Steps to avoid Social Engineering Cd Pirate (Apr 19)