SHARE
Facebook X Pinterest WhatsApp

SMBs Vulnerable To Social Engineering Exploits

Aug 18, 2010


ITBusinessEdge: SMBs Vulnerable To Social Engineering Exploits

SMB columnist Paul Mah discusses the risks inherent in not training employees to identify social engineering exploits designed to extract information for use in computer system hacking.


“Studies in the past have already shown SMBs to be lacking when it comes to security training. Should this be translated into a deficit in general security awareness, however, the situation becomes exploitable by social engineering to carve holes in even the most robust IT defenses like a hot knife through butter.

In fact, social engineering was actually used as part of Operation Aurora (aka The Google Hack) to determine working relationships between company staffers. This allowed the hackers to craft spoof e-mails with a much higher chance of tricking users into visiting a malware site. When you get down to it, the perpetuators could have learned of Google’s use of Internet Explorer 6 through social engineering, too.”

Recommended for you...

Boycotting Etsy? Explore Etsy Alternatives to Create an Independent Shop
Kaiti Norton
Apr 15, 2022
5 Small Business E-Commerce Trends for 2022 
Kaylyn McKenna
Apr 12, 2022
Shopify Unlocks Augmented Reality for Small Retailers
Kaiti Norton
Feb 25, 2022
How SMBs Can Navigate Post-Holiday Returns
Kaiti Norton
Dec 28, 2021
Small Business Computing Logo

Small Business Computing addresses the technology needs of small businesses, which are defined as businesses with fewer than 500 employees and/or less than $7 million in annual sales. To address the needs of these small businesses, Small Business Computing offers detailed coverage of cost-effective technology solutions, including lists of top vendors, product comparisons, and how-to guides that offer specific tools to help solve issues.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.