Connectivity at a cost: Internet social networking risks

May 3, 2019

By David Sexton

[1]There is no doubt that Internet-based social networking sites have created a revolution in social connectivity.

As we continue to openly embrace the benefits of these technological capabilities, we are also beginning to understand some of the real costs associated with this progress. Criminals who exploit these avenues for illegal purposes have been very successful in the deployment of cybercrimes against unsuspecting consumers and businesses. The more we learn about these crimes, however, the better we can prepare to mitigate potential losses.

What is the cost?

Unfortunately, the measurement of the total loss of cybercrime is difficult to determine. The lack of reliable data and resulting insufficient analysis can be attributed to many different factors. For one, if a breach does not affect customer security or compromise employee information, companies are not necessarily required to report these occurrences. To further complicate things, the impact of a reported breach is less apparent for those companies that are not publicly traded. Finally, often companies, especially smaller ones, might not even realize they have been breached.

A study from the Center for Strategic and International Studies (CSIS) determined that Canadian businesses lose an estimated $3 billion per year to cybercrime. These incidents are not exclusively attributed to technologically savvy security experts who are launching targeted attacks; anyone with a computer and an Internet connection is able to disrupt services and/or hold data for ransom. Further, the economic impact of cybercrime in Canada shows no signs of slowing down.

How does cybercrime take place?

As the familiar adage goes, “A chain is only as strong as its weakest link.” As such, there are two primary tactics criminals will use in the exploitation of online social networks (note that it is not uncommon for these strategies to be combined):

  1. Sophisticated hackers conversant in writing and manipulating code who access and/or successfully install unwanted software on a user’s computer or phone.
  2. ‘Social hackers’ (or ‘social engineers’) who manipulate and exploit individuals via social media through interactions that take place in person, over the phone, or through written communications.

Idiomatic expressions aside, when it comes to effective cyber security, human beings are the weakest link; social engineers exploit this knowledge to trick people into helping them get through security walls. These criminals are very good at designing their actions to be perceived as harmless, or even legitimate.

The potential damage done when an individual succumbs to an online scam or computer hack is shared by the individual and their employer. The risks include, and are not limited to: brand hijacking, damaged business reputation, intellectual property theft, data theft, identity theft, impersonation, loss of employment, damaged career or personal reputation, damaged data or networks, malware and virus dissemination, and lost revenue or income.

Many individuals are eager to share their personal information on social networking sites; however, once something has been posted, it is no longer private. As such, the more information someone posts, the more vulnerable they become to cybercrime. Criminals around the world troll social networking sites looking for exactly this kind of personal information to exploit.

How can cybercrime be prevented?

There are a variety of tactics criminals use to trick individuals into providing them with confidential information, or otherwise gain access to sensitive information via social networking channels. Being aware of these schemes can better protect you from these attacks.

Baiting

This occurs when someone provides you with a USB or other electronic storage device that is pre-loaded with malware in hopes you will use the device and enable them to hack your computer.

Actions:

 

Click-jacking

Often cybercriminals will conceal hyperlinks beneath legitimate clickable content which, when clicked, causes the user to unknowingly perform actions (i.e. download malware, steal your information, etc.). Many such scams have employed ‘like’ and ‘share’ buttons on social networking sites.

Action:

 

Often cybercriminals will conceal hyperlinks beneath legitimate clickable content which, when clicked, causes the user to unknowingly perform actions.[2]
Often cybercriminals will conceal hyperlinks beneath legitimate clickable content which, when clicked, causes the user to unknowingly perform actions.

Doxing

This refers to when an attacker publicly releases personal information (e.g. picture, full name, address, etc.) retrieved from your social networking profiles.

Action:

 

Elicitation

This strategy refers to the act of cybercriminals extracting personal information from their targets through seemingly casual conversation.

Action:

 

Pharming

Situations when a cybercriminal will redirect a user from a legitimate website to a fraudulent one with the intent of extracting confidential data.

Actions:

 

Phishing

This occurs when a user receives an e-mail that appears legitimate, but contains a link or file with malware. Also within this category are ‘spear phishing’ attacks, which target a specific individual or organization as their intended victim.

Action:

 

Scams

Situations when users are sent fake deals designed to trick them into providing money, information, or services.

Action:

 

Spoofing

Often cybercriminals will hide or fake their identity by using a sham e-mail address that simulates an authentic one. Likewise, IP spoofing hides or masks a computer’s IP address.

Action:

There are several resources available online (e.g. OnGuardOnline.gov[3]) that offer further details on how to best protect your workplace from social networking threats.

For added security, you can also protect your business with a cyber liability insurance policy. This covers the loss of money incurred due to financial fraud, as well as liability claims where there is a duty to defend lawsuits or regulatory penalties are incurred. These policies are an important piece in the risk management puzzle for small businesses like jewellers, especially as more and more criminals turn to social engineering tactics to steal and disrupt.

[4]David J. Sexton, CPCU, is vice-president of loss prevention consulting at Jewelers Mutual Insurance Group in the United States. A graduate of the University of Wisconsin, Sexton serves on the Underwriters Laboratories (UL) Security Systems Council, where he is a corporate member of the insurance category. He also sits on the board of directors for Jewellers Vigilance Canada (JVC) and worked on the Central Station Alarm Association’s (CSAA’s) Insurance Liaison Committee, which assisted in the development of the UL burglar alarm modular certificate program and revised UL standard. Comments and questions can be sent to lossprevention@jminsure.com[5].

For resources regarding safety and security when carrying or working with jewellery, visit JewelersMutual.com[6]. Jewelers Mutual Insurance Group is the only company specializing exclusively in jewellery insurance in Canada and the United States. It is licensed in Canada and all 50 states.

Endnotes:
  1. [Image]: https://www.jewellerybusiness.com/wp-content/uploads/2019/05/bigstock-Hacker-Using-Mobile-Smartphone-209826037.jpg
  2. [Image]: https://www.jewellerybusiness.com/wp-content/uploads/2019/05/bigstock-Login-Screen-In-App-Or-Website-267752317.jpg
  3. OnGuardOnline.gov: https://www.consumer.ftc.gov/features/feature-0038-onguardonline
  4. [Image]: https://www.jewellerybusiness.com/wp-content/uploads/2018/06/headshot-3.jpg
  5. lossprevention@jminsure.com: mailto:lossprevention@jminsure.com
  6. JewelersMutual.com: https://www.jewelersmutual.com/Home

Source URL: https://www.jewellerybusiness.com/features/connectivity-at-a-cost-internet-social-networking-risks/