Social Engineering Schemes
Social Engineering schemes manipulate victims (individuals, employees, etc.) into handing over sensitive information like passwords, bank account numbers, or even worse, complete control of their computer.
Even the most vigilant contact center agent is susceptible to these tricky schemes.
What is Social Engineering?
Criminals will pose as a representative of a large company (for example, Apple, Geico, or United Healthcare) calling in response to a question the victim supposedly has. But before they can proceed, the criminal must first "authenticate" the victim — verify a Social Security Number, a username and password, etc.
Sometimes, the criminal will even trick a victim into giving them remote access to their computer so the phony customer service rep can "fix" an issue.
SecureLogix's solution can be deployed in both SIP and TDM networks, and it integrates well with common network infrastructures. We support both large and small sites, and use nimble polices for detection and mitigation. Better yet, newly built business rules and policies are fed by call attributes and SIP signaling attributes, without impacting underlying software.
- Cloud-based deployment
- Call-control options
- Supports semi-static and dynamic white and black lists
- Customizable network queries on source number, number type checks, call authentication, etc.
- Accommodates industry regulatory requirements without changing software
Industries most vulnerable to Social Engineering schemes.
Global financial institutions and neighborhood banks alike face the same threats. Keeping calls flowing freely and securely is paramount.
Healthcare is especially vulnerable to fraud, scams and disruptions because of strict patient confidentiality rules and the life-or-death nature of their work.
With massive contact centers and a vulnerable customer base, energy and utilities providers are prime targets for sophisticated voice network attacks.
Our nation's security is under constant attack by government-sponsored hackers, independent bad actors, and political "hacktivists."
Corporate phone trees are easy targets for fraud, and the financial losses to you and your clients can be devastating.
911 phone system attacks are on the rise nationwide, leaving the most vulnerable high and dry.
Criminals direct their most sophisticated schemes toward enterprise phone systems for the greatest fallout.
A U.S. nation-wide banking institution experienced call pumping attacks in the form of thousands of calls into the bank’s 1-800 contact center numbers.
A large, U.S. regional banking institution was the target of several Telephony Denial of Service (TDoS) attacks, resulting in the loss of all telephone/voice services across multiple retail branch locations for an extended period.
A large regional financial institution and its customers were victims of phone-based financial fraud and account takeover attacks inside the bank’s national contact center operation.
A nation-wide healthcare corporation was receiving urgent, weekly reports of Telephony Denial of Service (TDoS) attacks from many of its more than 250 member hospitals across the U.S.
An international financial credit rating organization discovered that there were plans to use social media to organize a flash-mob Telephony Denial of Service (TDoS) attack against its voice systems and services.