Removing Crow from the Menu: Dealing with Social Engineering Attacks

Social engineering is bar none the most effective weapons in a hacker’s arsenal. As an MSP you’re used to dealing with vulnerabilities in computer systems. You know what to say to a client with a less-than-effective firewall or a network that isn’t protected by a VPN with multi-factor authentication. But hackers don’t always hack computers: they hack people too. You know all about protecting vulnerable computers. But how do you protect vulnerable people?

What do social engineering attacks look like? How can your clients protect themselves? And what can you do if one of your clients has fallen victim to one? Sign up now to attend Gillware’s upcoming cyber security webinar “Removing Crow from the Menu” and learn more about social engineering attacks:

Click here to register for the webinar

How is a hacker like a vampire?

Social engineering is a little like this, albeit with significantly less Bela Lugosi.

Social engineering is a little like this, albeit with significantly less Bela Lugosi.

No, this isn’t a trick question. And no, hackers aren’t pale, bloodsucking, garlic-hating creatures of the night that can be vanquished with a stake through the heart.

Your average hacker, though, much like bloodsuckers of legend, can only go where they’re invited. The kind of Hollywood hacker magic you often see in movies and police procedural TV shows simply does not exist.

Of course, most people would never voluntarily download a virus-laden email attachment. Therefore, hackers have gotten very good at tricking you into inviting them into your personal computer, or your small (or not-so-small) business’s network. In other words, in order to hack your computer, the hackers must first hack… you.

What can you do to help your clients avoid social engineering hacks?

And what can you do to help a client who’s fallen victim to one?

To answer these questions, we’ve put together a web-hosted presentation on social engineering, hosted by Cindy Murphy, President of Gillware Digital Forensics, and David Russell, Co-founder and managing partner of Alasdair Security Consulting. “Removing Crow from the Menu” will teach you all about social engineering, some of its most common forms, how you can teach your clients to steer clear of them, and how you can help a client recover from a successful social engineering hack.

Meet the Hosts of “Removing Crow from the Menu”

Both of our hosts are experts in cyber security and computer forensics, with ample skills in the field and a passion for helping people defend against and recover from cyber crime.

Cindy Murphy – Gillware Digital Forensics

Cindy Murphy is a well-known figure in the digital forensics community, with over 30 years of experience in law enforcement and over 17 years of experience in the field of digital and mobile forensics. As president of Gillware Digital Forensics, Cindy works to ensure we remain at the forefront of the digital forensics industry.

Dave Russell – Alasdair Security Consulting

Dave Russell is a managing partner and co-founder of Alasdair Security Consulting, a Madison, Wisconsin-based consulting company that assists business clients in making sure they are properly guarded against cyber threats. Dave is a computer forensics expert and holds CISSP, CSSLP and GCFA credentials.

Register now for “Removing Crow from the Menu: Dealing with Social Engineering Attacks.” This webinar will be held on June 15, 2017, at 11 AM CST. After you register, be sure to save the date, because you will not want to miss this webinar!