About Us | Contact Us
View Cart

Report Reveals IT Help Desk Workers to Be Targets for Social Engineering

By Vigilize | Tuesday, July 23, 2013 - One Comment

Failings in security measures make the help desk the weakest link in company security.

Help desk workers have been revealed to be the weakest point of entry for criminals using social engineering and technical attacks. A report released by the SANS institute and RSA focused on the current state of security and privacy practiced by IT help desk workers.

Part of the problem was found to be how these workers are judge on performance. Emphasis is placed on the number of requests they can solve (volume) and the speed in which they can solve them (time). Little attention is given to security and correct documentation of day-to-day activities conducted within the company.

Compounding the security risk of the help desk is the finding that organizations are using only basic personal information to confirm the identity of the callers, information that is easily accessible to anyone. In order to maintain their helpfulness, many help desk workers were found to be bypassing security controls used to properly identify callers.

What may be an even greater issue is the entering and storing of sensitive information into the help desk database, including personal health information. This information is often transmitted via non-secured channels such as email. Equally as dangerous are the notes jotted down on paper by help desk employees. These notes in many cases were found to contain sensitive data.

In the end, the report concluded that the root of the problem was a considerable lack of training, tools, and technology. The report states “help desk services are a rich entry point for social engineers and technical attackers. Help desks — and their applications — hold the ‘keys to the kingdom’ to better serve user requests.”


Original article by Steve Ragan.
Read the full story here.

One Response to “Report Reveals IT Help Desk Workers to Be Targets for Social Engineering”

Comment from Microsoft Server 2016
Time 11/16/2017 at 5:22 am

Hello I wish to to share a comment here concerning you to definitely be able to inform you just how much i personally Loved this particular study. I have to elope in order to a U.S.A Day time Supper but desired to leave ya an easy comment. We preserved you Same goes with be returning subsequent function to read more of yer quality articles. Keep up the quality work.

Microsoft Server 2016

Latest News
    Reasons why we should be considered! infotex provides a number of services that can be checked out if you click over to offerings.infotex.com! We even made a movie with all the reasons why infotex should be your next MSOC!  
    infotex and GoTo To all infotex managed security service Clients: As recently reported by major news outlets there was a data breach affecting GoTo (formerly LogMeIn) wherein attackers stole encrypted backups containing customer information in November 2022.  Based on the advisory from GoTo the products they offer that are affected include LogMeIn Pro, LogMeIn Central, […]
    An option for increasing security for ALL organizations. . . The threat landscape is evolving daily, and it is becoming increasingly difficult for even large organizations providing cyber defense services to keep up. As Brandao (2021) notes, it is important for organizations to adapt holistic technologies that can correlate all attack events. Therefore, developing XDR […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Check out posters.infotex.com for the whole collection! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape) You are welcome to print out and distribute this around your […]
    A relic of the internet’s less secure past, many small firms struggle to secure their email systems… An article review. With a great deal of cybersecurity related news focused on new threats and similarly new techniques aimed at combating them, it can be easy to forget some of the older threats that have never gone […]
    Seven Trends . . . …that small bank Information Security Officers face in 2023 Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Welcome to the Magnificent Seven, my annual predictive article about the seven trends in technology that will impact the Information Security Officers of […]
    System Security and Cybersecurity are not the same thing. . . Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Regarding “information security,” the last thirty years have seen an evolution of frameworks, laws, and assessment approaches which intimidate the management team with their complexity.  […]
    The cryptographic algorithm is vulnerable to attack and is no longer considered secure… An article review. NIST has announced that it plans to retire the SHA-1 cryptographic algorithm by the end of 2030, citing multiple vulnerabilities in the standard, effectively ending its use after nearly 30 years.  Introduced in 1995, SHA-1 used a 160-bit hash […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Check out posters.infotex.com for the whole collection! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape) You are welcome to print out and distribute this around your […]
    Trending: Awareness Posters Meet Infographics Here are the top seven posters as of the last twelve months! As always, our Awareness Posters were a hit in 2022! So we decided to run some reports to see what our most popular posters were since November 2021. As everybody loves top ten lists and contests, we thought […]