Head on collision on US-6 kills one, hospitalizes two

“If it’s a high volume of gas that’s coming out of a line, it could go really far. I couldn’t say exactly, but a couple hundred feet potentially,” Jolley said.

According to the NTSB report, the South Jordan leak started under the middle of the road and then snaked its way 150 feet into the house.

“The biggest danger with natural gas is when it’s confined in something like a structure or underground,” Jolley said.

And making it even more dangerous, from the distance the gas traveled, firefighters said it’s possible the rotten egg smell added to the gas, to warn you of a leak, could have gone away.

Pretexting is when an attacker uses a fabricated scenario (the pretext) to manipulate someone to give away sensitive information or do something that would compromise security. This type of attack often looks like the attacker posing as someone in a position of authority, like a manager or service provider, and asking for a password or personal data.

Baiting occurs when an attacker lures their target into a trap by enticing them with something like a free download. The attacker attaches malware to the bait, compromising the victim’s security.

This type of social engineering happens in person when an attacker gains unauthorized access to a restricted area by closely following someone with access. They often rely on an individual’s courtesy or trust to hold the door open for them, who then gain access to sensitive information or systems.

Finally, the “inside man” of social engineering refers to someone with legitimate access to a company or organization and compromises it to facilitate unauthorized activities. They exploit insider knowledge to hackers and provide access or data to carry out an attack. This technique is one of the most dangerous types of social engineering since it is difficult to detect.

As you can gather from the types of social engineering we shared above, the most common techniques include impersonation, manipulation, and deceit. Attackers prey on individuals by using a false sense of urgency or fear to encourage the victim to hand over sensitive information that they can use to access an information system or financial account.

The best way to protect yourself is to be aware of the common types of social engineering and be alert when you think someone may be using one of these techniques.

Always verify the identity of a person or organization who contacts you. Double-check the email addresses from messages that ask for sensitive information. Do not open attachments from sources you do not know.

It also helps to use strong, unique passwords for each account and two-factor authentication for your most protected accounts, such as an email or bank account.

Finally, always err on the side of caution when receiving unusual or unsolicited requests for information.

By staying vigilant and educating yourself, you can prevent social engineering attacks from impacting you or your company.

Les Olson can provide your team with more in-depth training to investigate this critical issue more thoroughly. Contact them today for more details and to schedule.

Be the first to comment

Leave a Reply

Your email address will not be published.


*