The opening scene of the 1990’s film Home Alone illustrates an example of an exploitative activity known as social engineering. Harry the burglar impersonates a cop and learns from Mr. McCallister himself exactly how his home is protected from intrusions – a simple system of automatic timers for their lights and locks for their doors. This knowledge gives Harry the confidence he needs to proceed with the burglary later in the film.
These types of attacks aren’t just for the movies. Cybercriminals today often use social engineering techniques to gain access to organizations and their sensitive data, even using organizations’ third-party vendors as an entry point.
Social engineering is a type of manipulation that occurs when the attacker tricks the victim into disclosing sensitive information. Many organizations are already aware of these third-party cybersecurity threats that can impact their operations.
Vulnerability and penetration testing can identify weaknesses that can be exploited by attackers, but social engineering methods, like a phishing attack, can be more challenging to prevent because they’re targeted towards employees who are essential for daily operations. In fact, the research company Forrester predicted that 90% of data breaches will include the human element in 2024.
Understanding the human factor in cybersecurity can help protect your organization from these common types of threats. It’s also essential to evaluate these threats in your third-party risk management (TPRM) program and ensure your vendors have addressed them in their security policies.
Social engineering attacks can be carried out in many forms, such as a phishing email or text with a fraudulent link, or even a phone call asking to verify your identity. These attacks can create the following risks for your organization, even when they’re targeted towards your third-party vendors:
One of the most effective ways to mitigate the risk of third-party social engineering attacks is through the due diligence process. Reviewing your vendor’s policies and procedures related to security training and awareness will help identify where your organization might be at risk of the human factor in cybersecurity.
The human element in cybersecurity will likely continue to be one of the biggest threats to address in your third-party risk management program. It’s important to stay aware of current social engineering methods and be intentional about assessing your vendors’ knowledge and preparedness for today’s most common cybersecurity attacks.