Security Awareness Presentations
Security Awareness Presentations
There is a keychain with a USB stick in the cafeteria. Who does the keychain belong to, who leaves it here unattended? Looking at what it says is then a natural reaction. A human reaction that can carry great risks. Attackers can use social engineering techniques to arouse a victim’s curiosity or greed and encourage him to insert the USB Stick into the computer by an unsuspecting person. People often do not consider the dangers of an (infected) USB Stick
USB dropping: a dangerous cyber threat
USB dropping is a cyber threat that is still current. Once the USB flash drive is inserted into the victim’s computer, malicious files can, in certain circumstances, be automatically downloaded onto the device without any interaction from the victim.
What is the purpose of our USB drop action?
The goal of this attack is to install malicious software, such as malware, on the victim’s computer and gain access to their system. In some cases, a signal that the USB drive has been inserted into the computer and the files opened is sufficient for the client.
Our USB drop action simulates a real attack on your organization. During this attack, insight is gained into how this attack is responded to and what the possible consequences could be of a successful attack. It provides a great starting point to increase employee resilience and raise awareness levels.
Organizations can protect against USB Drop attacks by training employees to increase awareness of the dangers.
In a USB drop, the following research questions are formulated:
- Are employees informed and aware of the dangers of a USB flash drive?
- Do employees know the rules about, of, for using USB sticks?
- Are any employees putting the USB stick in the computer and opening the files on the USB stick?
And if so, how many. - Will the USB flash drive be opened if found in a specific location?
Consider the difference between a USB drive left in the parking lot and a USB drive on a desk.
The USB stick is often combined with a mystery guest visit. It is also possible to send the USB flash drive by mail. Together with you, we can adapt the research questions and tailor the USB drop action more to your organization. Contact our social engineering account managers using the button below.
Become resilient against the most common technique used by cybercriminals
Become resilient against the most common technique used by cybercriminals