As a Managed Service Provider (MSP), your primary responsibility is to keep your clients operational and protected against cybercriminals. However, within the confines of a 24-hour day, there are only so many measures you can take. While bringing in the right vendors can bolster defenses once a threat is identified, the harsh reality is that it’s often human behavior that opens the door to attackers. Both IBM’s Cost of a Data Breach Report and the 2021 Verizon Data Breach Investigations Report (DBIR) reveal that a staggering 95% of cybersecurity breaches stem from human error. So, what is an MSP to do? Create awareness.
Social Engineering as the Tactic of Choice
One of the most significant tactics used by cybercriminals is social engineering, which targets individuals rather than technology. In this approach, threat actors manipulate users into divulging confidential information or taking actions that compromise security. Once these users are exploited, attackers can steal sensitive data, gain unauthorized access, and move laterally within the victim’s digital environment, expanding their reach and potential damage. According to the 2023 Verizon Data Breach Investigations Report (DBIR), social engineering was involved in approximately 44% of all data breaches, reflecting the growing effectiveness of these tactics.
10 Ways to Identify a Social Engineering Attack
- Unusual communication channels: Beware of unknown sources contacting through email, social or messaging apps.
- Use of urgency: Cybercriminals will often use a time clock or apply pressure to respond quickly, trying to evoke panic and get you to act without thinking.
- Suspicious links: Always hover over a link or attachment to verify its destination before clicking or opening.
- Request for sensitive information: Legitimate organizations will likely not ask for sensitive information through communication channels like email or messaging apps.
- Errors in content: Keep an eye out for grammar and spelling mistakes which can indicate phishing attempts.
- Offers too good to be true: Be skeptical of claims that seem too good to be true or require little to no effort.
- Sender Identity: Verify the identity of the sender through other channels before interacting.
- Behavior red flags: Keep an eye out for suspicious behaviors out of the norm with your day-to-day communications.
- Drastic changes: If someone you know suddenly changes their communication style or makes unusual requests, verify before engaging.
- Training and awareness: Regular training can help users identify attacks and keep inevitable threats at bay.
Human Error Happens, So Have a Backup
The ten best practices outlined above are essential for defending against cybercriminals, but it’s not a question of if you’ll be attacked—it’s when. This is why fostering awareness is a crucial first layer of defense. However, it’s equally important to have robust protection in place for those moments when someone inadvertently clicks on something they shouldn’t—and that will happen.
Managed Detection and Response (MDR) is one of the key layers to protecting against cyber threats as they are identified. MDR is technology backed by human expertise who identify and isolate on your behalf. This secondary layer of protection is critical for those times when human error takes over.