https://www.engineeringnews.co.za

Cybersecurity against whaling attacks depends on vigilance, controls

SIMEON TASSEV
The best way to protect against these types of social engineering cyberattacks is to verify the information

SIMEON TASSEV The best way to protect against these types of social engineering cyberattacks is to verify the information

12th August 2016

By: Schalk Burger

Creamer Media Senior Deputy Editor

  

Font size: - +

Defending senior managers and executives – the so-called whales of enterprises – against targeted cyberattacks requires that they and their support staff are aware of potential risks and query any suspicious activities, says cybersecurity consultancy and auditing firm Galix MD Simeon Tassev.

The public profile of company leaders and information about them readily available to cybercriminals enable them to launch attacks on those leaders using their personal information; the availability of such information makes it difficult to defend them against attacks.

However, adherence to processes and controls, best practice information management and questioning unusual or extraordinary requests will prevent cybercriminals from exploiting the information they have gathered about high-level employees.

“A cybercriminal targeting a high-profile manager can easily get professional and personal information to make an attack. Usually, whaling cyberattacks use social engineering, in which cybercriminals use gathered information to fraudulently present themselves as a person or organisation representative, as a means to carry out attacks.

“Attackers try to monetise this information, usually by attempting to get a fraudulent payment made with the information given by making it seem as if it is a legitimate business payment. There is also usually a sense of urgency presented in the fraudulent communication or a request to bypass a process or control.”

Most attackers get through, owing to the good intentions of staff who want to execute what appears to be a legitimate request by a superior.

“The best way to protect [oneself] against these types of social engineering cyberattacks is to use known and valid communication channels to get hold of the person and verify the information.”

Further, employees should query any requests to bypass normal procedures and controls. While the subsequent delays might lead to frustration among some employees, superiors or clients, validating a suspicious request prevents an irretrievable loss and is best practice, advises Tassev.

Galix provides consulting services for companies wanting to improve their cybersecurity, but it mainly audits and certifies the cybersecurity systems and practices in companies against standards of best practice.

The firm audits against the Payment Card Industry Data Security Standard, which is a body of standards used to govern electronic card payments in the financial services industry. Companies can use these high-level electronic processes and system standards to effectively protect their own processes and systems.

Edited by Martin Zhuwakinyu
Creamer Media Senior Deputy Editor

Comments

Showroom

Booyco Electronics
Booyco Electronics

Booyco Electronics, South African pioneer of Proximity Detection Systems, offers safety solutions for underground and surface mining, quarrying,...

VISIT SHOWROOM 
Rittal
Rittal

Rittal is a world leading provider of top-quality integrated systems for enclosures, power distribution, climate control, IT infrastructure and...

VISIT SHOWROOM 

Latest Multimedia

sponsored by

Magazine round up | 19 April 2024
Magazine round up | 19 April 2024
19th April 2024

Option 1 (equivalent of R125 a month):

Receive a weekly copy of Creamer Media's Engineering News & Mining Weekly magazine
(print copy for those in South Africa and e-magazine for those outside of South Africa)
Receive daily email newsletters
Access to full search results
Access archive of magazine back copies
Access to Projects in Progress
Access to ONE Research Report of your choice in PDF format

Option 2 (equivalent of R375 a month):

All benefits from Option 1
PLUS
Access to Creamer Media's Research Channel Africa for ALL Research Reports, in PDF format, on various industrial and mining sectors including Electricity; Water; Energy Transition; Hydrogen; Roads, Rail and Ports; Coal; Gold; Platinum; Battery Metals; etc.

Already a subscriber?

Forgotten your password?

MAGAZINE & ONLINE

SUBSCRIBE

RESEARCH CHANNEL AFRICA

SUBSCRIBE

CORPORATE PACKAGES

CLICK FOR A QUOTATION







sq:0.071 0.13s - 164pq - 2rq
Subscribe Now