How to defend HR against social engineering attacks

Unlike attacks that rely on malignant hardware or software, social engineering focuses on tricking employees into revealing or handing over private information. Given the wealth of personal information that HR personnel can access, that makes them a prime target for social engineering schemes.

Businesses are more familiar with cybersecurity risks than ever. More technology brings more opportunities for hackers to target companies in every industry. Since HR often deals with sensitive information, these departments are a common focus for cybercriminals — especially those leading social engineering attacks.

What Is Social Engineering?

Social engineering encompasses various cybersecurity threats that manipulate human users to access or control an organization’s computers or information systems. Hackers can steal valuable data to sell or use for their criminal purposes.

Unlike attacks that rely on malignant hardware or software, social engineering focuses on tricking employees into revealing or handing over private information. Given the wealth of personal information that HR personnel can access, that makes them a prime target for social engineering schemes.

No matter how attackers gain access, the results are devastating: the average cost per data breach rose 17% in 2021 and is still climbing, reaching the cost of $4.24 million for each incident. Though it may not seem like it immediately, HR is a critical line of defense against cyberattacks, so it is crucial to educate HR workers to take action against would-be hackers.

The Most Common Social Engineering Attacks

Cybercriminals use several popular social engineering schemes to gain the upper hand against HR departments. Companies should be aware of these potential attacks — awareness is the first step to preventing data losses.

Phishing

Phishing is the most well-known social engineering attack. It consists of hackers posing as reputable businesses or individuals and contacting targets, requesting personal information or access to private systems.

Phishing emails are the most common form, but criminals can also use texts and social media messages for phishing attacks. Despite their infamy, many employees still fall victim to phishing schemes, demonstrating just how compelling hackers can be.

Whaling

Whaling is the same as phishing — only the targets are high-level employees and executives. Executives have access to more meaningful and secure information, but they often face less oversight than other employees, which means data could be more at risk. That’s why it’s important to implement strict company policies for all employees and ensure everyone has the necessary training to identify phishing or whaling attacks — even top-level executives.

Pretexting

Pretexting is a form of phishing in which the hacker makes up a fake scenario and uses pretend urgency to get information from the target. The “pretext” they invent might be a fraudulent security company that needs an employee to send a deposit to protect the business’s accounts. Other hackers might pretend to be someone the victim knows, claiming they must borrow money immediately.

Diversion Theft

Organizations can face online and offline diversion theft. In the real world, criminals can intercept physical deliveries or trick couriers into delivering products to the wrong address. Online, hackers can divert sensitive information for their own purposes — for example, entering passwords into a forum that claims to be secure but is actually a front for a cyberattack.

Baiting

Baiting is a lot like phishing. However, it plays on people’s natural curiosity or greed. The scammer — posing as another business or individual — promises the target an item or reward in exchange for data.

For example, cybercriminals may try to convince users to enter their login credentials in order to get a free movie download. Baiting can also include physical goods. Completing a baiter’s survey may earn the employee hacked gift cards or a free USB drive that is actually filled with malware that hacks the company system.

Tailgating

Not all social engineering schemes take place online. Tailgating or piggybacking is when scammers attempt to access an enterprise’s physical location. Maybe they pose as a courier making a delivery and wait for an employee to enter the building, walking closely behind to get in the door. Once inside, hackers can infiltrate a business’s computer systems in several ways.

CEO Fraud

This specific type of fraud is a form of phishing in which the scammer impersonates the company CEO and reaches out to lower-level employees, requesting information. Unless the worker is vigilant, they might not realize the “CEO” is using a fake email or should be able to find the requested data on their own.

Watering Hole

A watering hole scheme is when hackers attack a third-party site their targets use often. For example, an employee might regularly visit a vendor’s website to place orders. Advanced scammers can infect the vendor’s site with a virus that steals the worker’s credentials or infects their computer with malware.

How to Identify and Prevent Social Engineering Attacks Against HR

All these social engineering attacks pose significant threats to HR departments. It only takes one mistake to open a business’s entire network to hackers and viruses. Fortunately, HR can defend against these risks with several cybersecurity measures.

1. Raise Awareness About the Risks

The first step to preventing cybercrime is being aware that it can happen. Since HR employees often work with unfamiliar people and sensitive data, they must remain vigilant. Organizations should remind workers of the risks and ensure proper protocols are easily accessible.

2. Work With IT Specialists

Cybersecurity is an IT problem and social engineering is a people problem, which means HR. These departments must work together to establish the proper guidelines for other employees as they navigate an often-complicated business world. IT experts will be able to provide the technical assistance necessary while HR departments educate employees on handling the human aspect of social engineering problems.

3. Set Clear and Firm Company Boundaries

When employees aren’t sure how to identify or address cybersecurity issues that pop up, there’s more room for mistakes. Companies should set clear and comprehensible boundaries workers can always refer to. Strong guidance gives everyone confidence as they navigate potential workplace social engineering attacks.

4. Always Verify Identities

HR employees regularly work with people outside their organization, which means unfamiliar names and emails. It can be hard to distinguish between genuine messages and phishing attempts. That’s why it’s critical for HR departments to have firm guidelines for when and how to verify an individual’s identity or a business’s authenticity.

5. Train Employees Regularly

Social engineering attacks change every day. With the rise of AI, they’re getting more advanced and harder to spot. That means companies must regularly update their training programs and provide employees with the latest facts to stay safe.

6. Create a Multi-Part Defense Plan

According to IBM, the global average data breach cost was $4.35 million in 2022 — the U.S. average was even higher, at $9.44 million a year. With such high stakes, having one line of defense isn’t enough. Enterprises should implement multiple levels of cybersecurity, including HR input on protecting against social engineering.

Defending HR Against Social Engineering Attacks

HR is a common target for social engineering attacks — and they’re also a crucial barrier in a business’s defense against cybercrime. When HR workers have the proper tools and training to identify and prevent these attacks, they help keep their company safe.

    Read more

    Latest News

    Read More

    The importance of secure storage in promoting employee trust and wellbeing

    21 November 2024

    Newsletter

    Receive the latest HR news and strategic content

    Please note, as per the GDPR Legislation, we need to ensure you are ‘Opted In’ to receive updates from ‘theHRDIRECTOR’. We will NEVER sell, rent, share or give away your data to third parties. We only use it to send information about our products and updates within the HR space To see our Privacy Policy – click here

    Latest HR Jobs

    University of Bath – Digital, Data & Technology GroupSalary: £46,485 to £55,295. Grade 8, per annum

    University of Greenwich – People DirectorateSalary: £56,921 to £65,814 per annum, plus £5400 London weighting per annum

    University of Sussex – Human Resources Salary: £25,433 to £28,879 per annum, pro rata if part time, Grade 4. This role is not eligible for

    University of Exeter – University Corporate ServicesSalary: The starting salary will be from £26,257 on Grade C, depending on qualifications and experience.

    Read the latest digital issue of theHRDIRECTOR for FREE

    Read the latest digital issue of theHRDIRECTOR for FREE