Peter Martini, president and co-founder of cloud cybersecurity company iboss, tells Digital Journal that the type of attack is becoming commonplace: “These types of social engineering attacks are becoming far more common. This threat, where attackers tricked employees into breaching security procedures, is especially dangerous in remote workplaces.” This is in the context of remote working being more common in the coronavirus era.
In terms of what can be learnt from this form of attack against a public agency, Martini adds: “Organizations must leverage modern systems with security in the cloud that follows the employee no matter where they are and also implement newer security approaches that would prevent a bad actor from gaining access in the first place.”
Looking at the matter from a slightly different perspective, Robert Prigge, CEO of Jumio considers the use of personally identifiable information: “Cybercriminals can use the exposed Personally Identifiable Information (PII) to access user accounts or combine it with other readily available information on the dark web to change passwords, lock users out and steal their benefits.”
He also considers how traditional methods of driving cybersecurity allowed the incident to happen, noting that: “Enterprises have no way of knowing whether the person logging in is the actual account owner or a fraudster using stolen information to access the account.” However, each organization has a responsibility to protect personal data.
He also has advice for the state sector, explaining: “Government agencies must adapt to the modern fraud landscape to keep citizens safe. Implementing biometric authentication is far more secure, as it cannot be bypassed through credential stuffing or social engineering techniques.”
Get your CompTIA A+, Network+ White Hat-Hacker, Certified Web Intelligence Analyst and more starting at $35 a month. Click here for more details.