Social Engineering and the “Ishings” Explained

the exploit blog logo
The Exploit: Penetration Testing Insights From The Frontlines
Posted on October 16, 2020
Brian Tant, Raxis CTO

Written by Bonnie Smyre

What You Need to Know about Social Engineering

Long gone are the days of a Nigerian Prince trying to win you over – via email – with his incredible offers. Today, it is all about the ‘ishings’ – you know, phishing, vishing, spear-phishing and smishing. And don’t forget about direct interaction. 

Ah, the wonderful world of social engineering. Hackers love it because it’s highly effective, and, though there is no way to just make it go away, there are plenty of ways you can become more resistant to these types of attacks. 

Check out the video above from our smart friend Brian Tant, Chief Technology Officer here at Raxis, who explains it all in terms even your grandpa can understand.

Effective cybersecurity requires an investment of time, talent, and treasure. But, when you consider that a cyberattack can cost even a small business upwards of $200,000 – plus reputation damage and other intangibles, the costs to harden your security posture are a bargain. Every company needs a cybersecurity threat mitigation plan. 

Enter Raxis. Our team of experts can bring your company’s security vulnerabilities to light, show you how to remedy them, and provide ongoing remote monitoring to help you stay secure.

Download our list of Top 10 Cyber Attacks to learn more about ways to secure your company.

Want to learn more? Take a look at the first part of our Common Vulnerabilities discussion.

Bonnie Smyre

Bonnie Smyre

Bonnie Smyre, the Chief Operating Officer at Raxis, is a seasoned cybersecurity expert with over 25 years of experience in the technology industry. Bonnie began her career as a consultant and applications specialist before joining Raxis in 2013. Her unique background combines extensive IT expertise with improv skills, which she has leveraged to excel in physical security evaluations as well as in her current role leading operations at Raxis. Bonnie’s journey from a shy IT professional to a confident leader showcases her adaptability and commitment to personal growth in the cybersecurity field.

Search The Exploit Blog

Stay up to date with the latest in penetration testing

Name(Required)
Newsletter(Required)
Do you wish to join our newsletter? We send out emails once a month that cover the latest in cybersecurity news. We do not sell your information to other parties.