{"id":29557,"date":"2023-09-27T08:45:22","date_gmt":"2023-09-27T15:45:22","guid":{"rendered":"https:\/\/paladinpointofsale.com\/retailscience\/home\/?p=29557"},"modified":"2025-09-22T15:06:52","modified_gmt":"2025-09-22T22:06:52","slug":"social-engineering-is-targeting-retail","status":"publish","type":"post","link":"https:\/\/paladinpointofsale.com\/retailscience\/home\/social-engineering-is-targeting-retail\/","title":{"rendered":"Retail is a Choice Target for Social Engineering"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; _builder_version=&#8221;4.16&#8243; background_color=&#8221;rgba(0,0,0,0.29)&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_fullwidth_post_title meta=&#8221;off&#8221; featured_placement=&#8221;background&#8221; text_color=&#8221;light&#8221; _builder_version=&#8221;4.24.2&#8243; title_font=&#8221;|700||on|||||&#8221; title_text_color=&#8221;#ffffff&#8221; title_font_size=&#8221;30px&#8221; background_color=&#8221;rgba(0,0,0,0.15)&#8221; background_enable_image=&#8221;off&#8221; background_position=&#8221;top_center&#8221; background_blend=&#8221;color&#8221; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; text_orientation=&#8221;center&#8221; custom_padding=&#8221;15%||15%&#8221; z_index_tablet=&#8221;0&#8243; title_text_shadow_style=&#8221;preset5&#8243; title_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; title_text_shadow_vertical_length_tablet=&#8221;0px&#8221; title_text_shadow_blur_strength_tablet=&#8221;1px&#8221; meta_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; meta_text_shadow_vertical_length_tablet=&#8221;0px&#8221; meta_text_shadow_blur_strength_tablet=&#8221;1px&#8221; box_shadow_horizontal_tablet=&#8221;0px&#8221; box_shadow_vertical_tablet=&#8221;0px&#8221; box_shadow_blur_tablet=&#8221;40px&#8221; box_shadow_spread_tablet=&#8221;0px&#8221; text_shadow_style=&#8221;preset2&#8243; parallax_effect=&#8221;on&#8221; module_bg_color=&#8221;rgba(255,255,255,0)&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_fullwidth_post_title][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; custom_padding=&#8221;0px|0px|18.95px|0px|false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Preamble&#8221; _builder_version=&#8221;4.25.0&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; z_index_tablet=&#8221;0&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_2_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_2_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_2_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_3_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_3_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_3_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_4_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_4_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_4_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_5_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_5_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_5_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_6_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_6_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_6_text_shadow_blur_strength_tablet=&#8221;1px&#8221; box_shadow_horizontal_tablet=&#8221;0px&#8221; box_shadow_vertical_tablet=&#8221;0px&#8221; box_shadow_blur_tablet=&#8221;40px&#8221; box_shadow_spread_tablet=&#8221;0px&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span data-contrast=\"auto\">Dutch industrialist Jacob Cornelis van Marken coined the term \u201cSocial Engineering\u201d back in the 1890s when he was describing work being done to \u201cimprove what was amiss in the world.\u201d Nearly 150 years later, social engineering now describes something completely different. It\u2019s the way cybercriminals try to manipulate people to steal information, data and money from businesses and organizations of all sizes and retail stores are among their prized targets.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Fortinet, a global leader in cybersecurity, says that because of the sheer amount of customer data retail businesses collect, stores have become the No. 1 target of cybercriminals. Data from Trend Micro, a leading provider of antivirus services, shows that\u00a0<\/span><a href=\"https:\/\/www.csoonline.com\/article\/573625\/ransomware-attacks-on-retailers-rose-75-in-2021.html\"><span data-contrast=\"none\">77% of retail organizations were hit by ransomware in 2021<\/span><\/a><span data-contrast=\"auto\">, an increase of 33% over the previous year.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Payment card data is the new currency, which is what retailers small to large have in abundance.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Cybersecurity is a popular topic, especially in October because it\u2019s traditionally Cybersecurity Awareness Month and 2023 marks the 20<\/span><span data-contrast=\"auto\">th<\/span><span data-contrast=\"auto\">\u00a0anniversary of its creation.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p>[\/et_pb_text][et_pb_text admin_label=&#8221;Pandemic hangover&#8221; _builder_version=&#8221;4.25.0&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; z_index_tablet=&#8221;0&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_2_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_2_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_2_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_3_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_3_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_3_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_4_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_4_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_4_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_5_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_5_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_5_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_6_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_6_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_6_text_shadow_blur_strength_tablet=&#8221;1px&#8221; box_shadow_horizontal_tablet=&#8221;0px&#8221; box_shadow_vertical_tablet=&#8221;0px&#8221; box_shadow_blur_tablet=&#8221;40px&#8221; box_shadow_spread_tablet=&#8221;0px&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><b><span data-contrast=\"auto\">PANDEMIC HANGOVER<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">It\u2019s hard to put all the blame on the COVID-19 pandemic for retail\u2019s problem with cybersecurity. Certainly, it was an issue well before 2020. But when businesses were forced to close their brick-and-mortar stores, they had to find another way to make sales, and e-commerce launched like a rocket.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Web store sales and the subsequent increase in credit and payment card transactions enlarged every store\u2019s digital footprint, and the bigger the digital footprint, the easier it is to stub a toe.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_text admin_label=&#8221;Social engineering&#8221; _builder_version=&#8221;4.25.0&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; z_index_tablet=&#8221;0&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_2_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_2_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_2_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_3_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_3_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_3_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_4_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_4_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_4_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_5_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_5_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_5_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_6_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_6_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_6_text_shadow_blur_strength_tablet=&#8221;1px&#8221; box_shadow_horizontal_tablet=&#8221;0px&#8221; box_shadow_vertical_tablet=&#8221;0px&#8221; box_shadow_blur_tablet=&#8221;40px&#8221; box_shadow_spread_tablet=&#8221;0px&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><b><span data-contrast=\"auto\">SOCIAL ENGINEERING IS SOCIALLY UNACCEPTABLE\u00a0<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">So now, the definition of social engineering has changed. Carnegie Mellon University defines it as \u201cthe tactic of manipulating, influencing, or deceiving a victim to gain control over a computer system, or to steal personal and financial information. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.\u201d<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The perpetrators, either through emails or phone calls, impersonate someone, often a security provider or contractor, to gain access to their victim\u2019s business network. These pretexts can include:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><strong><span style=\"color: #cc6633\">Phishing<\/span><\/strong><span data-contrast=\"auto\">\u00a0\u2013 emails, texts, or phone calls attempting to obtain information such as computer usernames or passwords.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><strong><span style=\"color: #cc6633\">Baiting<\/span><\/strong><span data-contrast=\"auto\">\u00a0\u2013 a type of attack that involves a scammer using a false promise to get victims into opening malicious attachments or visiting false websites.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><strong><span style=\"color: #cc6633\">Scareware<\/span><\/strong><span data-contrast=\"auto\"><strong>\u00a0<\/strong>\u2013 involves convincing victims that their computers or networks are already infected with malware to gain access.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The 2023 Verizon Data Breach Investigation Report shows that these kinds of attacks have nearly doubled over the past few years and now represent more than half of all incidents. Of them:<\/span><\/p>\n<p>[\/et_pb_text][et_pb_blurb title=&#8221;74% involve people either mistakenly responding to an email, text, or phone call, or use of stolen credentials. &#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe00e;||divi||400&#8243; icon_color=&#8221;#cc6633&#8243; icon_placement=&#8221;left&#8221; admin_label=&#8221;Blurb &#8211; 74%&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; animation_style=&#8221;fade&#8221; animation_delay=&#8221;1000ms&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][et_pb_blurb title=&#8221;83% involve external people, not with the business being violated. &#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe00e;||divi||400&#8243; icon_color=&#8221;#cc6633&#8243; icon_placement=&#8221;left&#8221; admin_label=&#8221;Blurb &#8211; 83%&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; animation_style=&#8221;fade&#8221; animation_delay=&#8221;1000ms&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][et_pb_blurb title=&#8221;95% are financially driven. &#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe00e;||divi||400&#8243; icon_color=&#8221;#cc6633&#8243; icon_placement=&#8221;left&#8221; admin_label=&#8221;Blurb &#8211; 95%&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; animation_style=&#8221;fade&#8221; animation_delay=&#8221;1000ms&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][et_pb_text admin_label=&#8221;Reverse engineering&#8221; _builder_version=&#8221;4.25.0&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; z_index_tablet=&#8221;0&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_2_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_2_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_2_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_3_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_3_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_3_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_4_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_4_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_4_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_5_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_5_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_5_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_6_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_6_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_6_text_shadow_blur_strength_tablet=&#8221;1px&#8221; box_shadow_horizontal_tablet=&#8221;0px&#8221; box_shadow_vertical_tablet=&#8221;0px&#8221; box_shadow_blur_tablet=&#8221;40px&#8221; box_shadow_spread_tablet=&#8221;0px&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><b><span data-contrast=\"auto\">REVERSE ENGINEERING<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">The National Cybersecurity Alliance suggests some incredibly simple behaviors to avoid becoming a victim of a social engineering, or any other kind of attack.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><strong><span style=\"color: #cc6633\">Use strong passwords and enlist a password manager.<\/span><\/strong><span data-contrast=\"auto\">The NCA says passwords should be long, unique and complex. They should be at least 12 characters. They should be unique \u2013 don\u2019t reuse them and none should look alike. They should also have a good mix of upper and lower cases, numbers and letters, and special characters. The National Institute of Standards and Technology recommends changing passwords every few months, too.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Password managers can help with this. They help manage hundreds of passwords for online accounts, protect a user\u2019s identity, notify users of potential phishing, and alert users when a password might be compromised.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><strong><span style=\"color: #cc6633\">Turn on multifactor authentication.\u00a0<\/span><\/strong><span data-contrast=\"auto\">Although it probably seems like a simple solution, having two steps \u2013 or two passwords \u2013 to access online accounts simply doubles their security. These passwords can range from simple PINs (personal identification numbers) to security questions (What is your hometown?) to biometric identifiers such as facial or fingerprint identification.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><strong><span style=\"color: #cc6633\">Recognize and report phishing.<\/span><\/strong><span data-contrast=\"auto\">It might seem simple, but recognizing phishing is as simple as recognizing any other kind of fraud. Does it smell funny?<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Does it:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p>[\/et_pb_text][et_pb_blurb title=&#8221;Come from an unfamiliar source?&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#x5c;||divi||400&#8243; icon_color=&#8221;#cc6633&#8243; icon_placement=&#8221;left&#8221; admin_label=&#8221;Blurb &#8211; Come from&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; animation_style=&#8221;fade&#8221; animation_delay=&#8221;1000ms&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][et_pb_blurb title=&#8221;Have an offer that seems too good to be true? &#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#x5c;||divi||400&#8243; icon_color=&#8221;#cc6633&#8243; icon_placement=&#8221;left&#8221; admin_label=&#8221;Blurb &#8211; Have an offer&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; animation_style=&#8221;fade&#8221; animation_delay=&#8221;1000ms&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][et_pb_blurb title=&#8221;Ask for personal information?&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#x5c;||divi||400&#8243; icon_color=&#8221;#cc6633&#8243; icon_placement=&#8221;left&#8221; admin_label=&#8221;Blurb &#8211; Ask for&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; animation_style=&#8221;fade&#8221; animation_delay=&#8221;1000ms&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][et_pb_blurb title=&#8221;Stress urgency and ask for users to click on unfamiliar links or open attachments?&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#x5c;||divi||400&#8243; icon_color=&#8221;#cc6633&#8243; icon_placement=&#8221;left&#8221; admin_label=&#8221;Blurb &#8211; Stress urgency&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; animation_style=&#8221;fade&#8221; animation_delay=&#8221;1000ms&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][et_pb_blurb title=&#8221;Or just not look right? Misspellings, odd language, strange email address.&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#x5c;||divi||400&#8243; icon_color=&#8221;#cc6633&#8243; icon_placement=&#8221;left&#8221; admin_label=&#8221;Blurb &#8211; Or just&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; animation_style=&#8221;fade&#8221; animation_delay=&#8221;1000ms&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][et_pb_text admin_label=&#8221;If it does&#8221; _builder_version=&#8221;4.25.0&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; hover_enabled=&#8221;0&#8243; z_index_tablet=&#8221;0&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_2_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_2_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_2_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_3_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_3_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_3_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_4_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_4_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_4_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_5_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_5_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_5_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_6_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_6_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_6_text_shadow_blur_strength_tablet=&#8221;1px&#8221; box_shadow_horizontal_tablet=&#8221;0px&#8221; box_shadow_vertical_tablet=&#8221;0px&#8221; box_shadow_blur_tablet=&#8221;40px&#8221; box_shadow_spread_tablet=&#8221;0px&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p><span data-contrast=\"auto\">If it does, do with it what you would do with any bad fish \u2013 trash it and\/or report it. Most good IT managers have a way to report phishy emails.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><strong><span style=\"color: #cc6633\">Update software.<\/span><\/strong><span data-contrast=\"auto\">Software companies update their products for several reasons, and one is to keep them and their users safe. That\u2019s why it\u2019s always important to update whenever asked, although only download updates if they come from your provider. They can contain malware and viruses just like any phishing product.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Point of sale and retail management software providers often offer services to manage their products and make life easier for their customers.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Updates are often required to maintain PCI compliance which keeps stores operating safely.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span class=\"TextRun SCXW247818290 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW247818290 BCX0\">\u201cWindows\u00a0<\/span><span class=\"NormalTextRun SCXW247818290 BCX0\">u<\/span><span class=\"NormalTextRun SCXW247818290 BCX0\">pdates are extremely important. If users\u00a0<\/span><span class=\"NormalTextRun SCXW247818290 BCX0\">don\u2019t<\/span><span class=\"NormalTextRun SCXW247818290 BCX0\">\u00a0update their software regularly,\u00a0<\/span><span class=\"NormalTextRun SCXW247818290 BCX0\">they\u2019re<\/span><span class=\"NormalTextRun SCXW247818290 BCX0\">\u00a0just making it easier for\u00a0<\/span><span class=\"NormalTextRun SCXW247818290 BCX0\">bad guys to get in there and do something,\u201d says Brandon Hays, Managed Services Lead for<a href=\"https:\/\/paladinpointofsale.com\/managed-services\/\" target=\"_blank\" rel=\"noopener\">\u00a0Paladin Data Corporation<\/a>, a leading provider of retail management<\/span><span class=\"NormalTextRun SCXW247818290 BCX0\">\u00a0software solutions. \u201cThat said, Windows updates is set to auto<\/span><span class=\"NormalTextRun SCXW247818290 BCX0\">matically install by default. That means\u00a0<\/span><span class=\"NormalTextRun SCXW247818290 BCX0\">it\u2019s<\/span><span class=\"NormalTextRun SCXW247818290 BCX0\">\u00a0going to install whenever it wants\u00a0<\/span><span class=\"NormalTextRun SCXW247818290 BCX0\">to,<\/span><span class=\"NormalTextRun SCXW247818290 BCX0\">\u00a0and it requires a reboot to complete the installation.<\/span><\/span><\/p>\n<p><span class=\"TextRun SCXW247818290 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW247818290 BCX0\">\u201cIf a store is in the mi<\/span><span class=\"NormalTextRun SCXW247818290 BCX0\">ddle of ringing up a sale and\u00a0<\/span><span class=\"NormalTextRun SCXW247818290 BCX0\">there\u2019s<\/span><span class=\"NormalTextRun SCXW247818290 BCX0\">\u00a010 people in line and the server decides to start a Windows update, that store goes down<\/span><span class=\"NormalTextRun SCXW247818290 BCX0\">\u00a0until the update is complete<\/span><span class=\"NormalTextRun SCXW247818290 BCX0\">.<\/span>\u00a0<span class=\"NormalTextRun SCXW247818290 BCX0\">That\u2019s<\/span><span class=\"NormalTextRun SCXW247818290 BCX0\">\u00a0why we introduced Paladin Managed Updates\u2122. We have a solution to control Windows updates in a way that\u00a0<\/span><span class=\"NormalTextRun SCXW247818290 BCX0\">it\u2019s<\/span><span class=\"NormalTextRun SCXW247818290 BCX0\">\u00a0not interfering with business operations.<\/span><span class=\"NormalTextRun SCXW247818290 BCX0\">\u201d<\/span><\/span><span class=\"EOP SCXW247818290 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Managed Updates\u2122 is a product that verifies and tests software updates and either blocks them, if they can\u2019t be verified, or schedules them for downloads after business hours. This prevents distracting update popup messages from slowing down business operations.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p>[\/et_pb_text][et_pb_text admin_label=&#8221;Low tech&#8221; _builder_version=&#8221;4.25.0&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; z_index_tablet=&#8221;0&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_2_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_2_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_2_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_3_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_3_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_3_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_4_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_4_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_4_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_5_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_5_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_5_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_6_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_6_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_6_text_shadow_blur_strength_tablet=&#8221;1px&#8221; box_shadow_horizontal_tablet=&#8221;0px&#8221; box_shadow_vertical_tablet=&#8221;0px&#8221; box_shadow_blur_tablet=&#8221;40px&#8221; box_shadow_spread_tablet=&#8221;0px&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>LOW TECH ATTACKS, HIGH QUALITY RESPONSE<\/h3>\n<p><span data-contrast=\"auto\">Not every cyberattack requires a team of coders or loads of technical knowledge. Anyone with a phone, a little bit of research, some knowledge of protocols, and a little bit of audacity can gain access to a business\u2019s network.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Earlier this year, one hardware store received a call from a person who claimed to be with the company that provided his store\u2019s technical support. The caller said he was responding to a help request and asked for the store\u2019s support credentials and password. If the employee had surrendered that information, the caller, using a remote monitoring and management program, would have gained access to the store\u2019s network where they could have turned that business upside down.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Luckily for the store, the astute employee was suspicious that a support technician would need that kind of information. He phoned his store\u2019s technology provider to find out if there was any kind of support request. He found out there were no outstanding help requests and, in doing so, saved his store a big headache that could have ended in lost data or worse.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span class=\"TextRun SCXW186394563 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW186394563 BCX0\">\u201cMost of our clients are small, independent business owners. They have just a few computer terminals. They\u00a0<\/span><span class=\"NormalTextRun SCXW186394563 BCX0\">don\u2019t<\/span><span class=\"NormalTextRun SCXW186394563 BCX0\">\u00a0have enough resources for an IT departm<\/span><span class=\"NormalTextRun SCXW186394563 BCX0\">ent, which covers antivirus, backup solutions, and general network management.\u00a0<\/span><span class=\"NormalTextRun SCXW186394563 BCX0\">That\u2019s<\/span><span class=\"NormalTextRun SCXW186394563 BCX0\">\u00a0where we can help.\u00a0<\/span><span class=\"NormalTextRun SCXW186394563 BCX0\">We\u2019re<\/span><span class=\"NormalTextRun SCXW186394563 BCX0\">\u00a0the IT guys. Our Managed Services handles those ch<\/span><span class=\"NormalTextRun SCXW186394563 BCX0\">ores for these businesses, plus we take care of their point-of-sale software and system,\u201d Hays explains.<\/span><\/span><span class=\"EOP SCXW186394563 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This story is proof that a little bit of skepticism about everything from answering a phone call to responding to an email is a good thing. It\u2019s also proof that a relatively new category of cybercrime \u2013 social engineering \u2013 is spreading like a virus.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Author&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">brian bullock\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Author<\/span> [\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Because of the amount of customer data retailers collect, stores have become the No. 1 target of cybercriminals using social engineering.<\/p>\n","protected":false},"author":13,"featured_media":29558,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<table style=\"width: 100%; border-collapse: collapse; border-style: solid; height: 211px;\"><tbody><tr style=\"height: 211px;\"><td style=\"width: 100%; border-color: #42768d; height: 211px; background-color: #42768d;\" scope=\"row\"><img class=\"aligncenter wp-image-29558 size-full\" src=\"https:\/\/paladinpointofsale.com\/retailscience\/wp-content\/uploads\/sites\/2\/2023\/09\/RS-October23_CyberSignIn-600.jpg\" alt=\"Images of a computer screen with log in information.\" width=\"600\" height=\"300\" \/><\/td><\/tr><\/tbody><\/table><h2>\u00a0<\/h2><h1>Retail is a Choice Target for Social Engineering<\/h1><p><span style=\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\"><b><span style=\"color: #808080;\">by Brian Bullock | September 29, 2023<\/span><\/b><\/span><\/p><p><span data-contrast=\"auto\">Dutch industrialist Jacob Cornelis van Marken coined the term \u201cSocial Engineering\u201d back in the 1890s when he was describing work being done to \u201cimprove what was amiss in the world.\u201d Nearly 150 years later, social engineering now describes something completely different. It\u2019s the way cybercriminals try to manipulate people to steal information, data and money from businesses and organizations of all sizes and retail stores are among their prized targets.<\/span><span data-ccp-props=\"{\"201341983\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Fortinet, a global leader in cybersecurity, says that because of the sheer amount of customer data retail businesses collect, stores have become the No. 1 target of cybercriminals. Data from Trend Micro, a leading provider of antivirus services, shows that <\/span><a href=\"https:\/\/www.csoonline.com\/article\/573625\/ransomware-attacks-on-retailers-rose-75-in-2021.html\"><span data-contrast=\"none\">77% of retail organizations were hit by ransomware in 2021<\/span><\/a><span data-contrast=\"auto\">, an increase of 33% over the previous year.<\/span><span data-ccp-props=\"{\"201341983\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Payment card data is the new currency, which is what retailers small to large have in abundance.<\/span><span data-ccp-props=\"{\"201341983\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Cybersecurity is a popular topic, especially in October because it\u2019s traditionally Cybersecurity Awareness Month and 2023 marks the 20<\/span><span data-contrast=\"auto\">th<\/span><span data-contrast=\"auto\"> anniversary of its creation.<\/span><span data-ccp-props=\"{\"201341983\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p><h2><b><span data-contrast=\"auto\">Pandemic hangover<\/span><\/b><span data-ccp-props=\"{\"201341983\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/h2><p><span data-contrast=\"auto\">It\u2019s hard to put all the blame on the COVID-19 pandemic for retail\u2019s problem with cybersecurity. Certainly, it was an issue well before 2020. But when businesses were forced to close their brick-and-mortar stores, they had to find another way to make sales, and e-commerce launched like a rocket.<\/span><span data-ccp-props=\"{\"201341983\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Web store sales and the subsequent increase in credit and payment card transactions enlarged every store\u2019s digital footprint, and the bigger the digital footprint, the easier it is to stub a toe.\u00a0<\/span><span data-ccp-props=\"{\"201341983\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p><h2><b><span data-contrast=\"auto\">Social engineering is socially unacceptable\u00a0<\/span><\/b><span data-ccp-props=\"{\"134233117\":false,\"134233118\":false,\"201341983\":0,\"335551550\":1,\"335551620\":1,\"335559685\":0,\"335559737\":0,\"335559738\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/h2><p><span data-contrast=\"auto\">So now, the definition of social engineering has changed. Carnegie Mellon University defines it as \u201cthe tactic of manipulating, influencing, or deceiving a victim to gain control over a computer system, or to steal personal and financial information. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.\u201d<\/span><span data-ccp-props=\"{\"134233117\":false,\"134233118\":false,\"201341983\":0,\"335551550\":1,\"335551620\":1,\"335559685\":0,\"335559737\":0,\"335559738\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">The perpetrators, either through emails or phone calls, impersonate someone, often a security provider or contractor, to gain access to their victim\u2019s business network. These pretexts can include:<\/span><span data-ccp-props=\"{\"134233117\":false,\"134233118\":false,\"201341983\":0,\"335551550\":1,\"335551620\":1,\"335559685\":0,\"335559737\":0,\"335559738\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p><p><span style=\"color: #42768d;\"><b>Phishing<\/b><\/span><span data-contrast=\"auto\"> \u2013 emails, texts, or phone calls attempting to obtain information such as computer usernames or passwords.<\/span><span data-ccp-props=\"{\"134233117\":false,\"134233118\":false,\"201341983\":0,\"335551550\":1,\"335551620\":1,\"335559685\":0,\"335559737\":0,\"335559738\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p><p><span style=\"color: #42768d;\"><b>Baiting<\/b><\/span><span data-contrast=\"auto\"> \u2013 a type of attack that involves a scammer using a false promise to get victims into opening malicious attachments or visiting false websites.<\/span><span data-ccp-props=\"{\"134233117\":false,\"134233118\":false,\"201341983\":0,\"335551550\":1,\"335551620\":1,\"335559685\":0,\"335559737\":0,\"335559738\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p><p><span style=\"color: #42768d;\"><b>Scareware<\/b><\/span><span data-contrast=\"auto\"> \u2013 involves convincing victims that their computers or networks are already infected with malware to gain access.<\/span><span data-ccp-props=\"{\"134233117\":false,\"134233118\":false,\"201341983\":0,\"335551550\":1,\"335551620\":1,\"335559685\":0,\"335559737\":0,\"335559738\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">The 2023 Verizon Data Breach Investigation Report shows that these kinds of attacks have nearly doubled over the past few years and now represent more than half of all incidents. Of them:<\/span><\/p><ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{\"335552541\":1,\"335559684\":-2,\"335559685\":720,\"335559991\":360,\"469769226\":\"Symbol\",\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\uf0b7\",\"469777815\":\"hybridMultilevel\"}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">74% involve people either mistakenly responding to an email, text, or phone call, or use of stolen credentials.<\/span><span data-ccp-props=\"{\"134233117\":false,\"134233118\":false,\"201341983\":0,\"335551550\":1,\"335551620\":1,\"335559737\":0,\"335559738\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{\"335552541\":1,\"335559684\":-2,\"335559685\":720,\"335559991\":360,\"469769226\":\"Symbol\",\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\uf0b7\",\"469777815\":\"hybridMultilevel\"}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">83% involve external people, not with the business being violated.<\/span><span data-ccp-props=\"{\"134233117\":false,\"134233118\":false,\"201341983\":0,\"335551550\":1,\"335551620\":1,\"335559737\":0,\"335559738\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{\"335552541\":1,\"335559684\":-2,\"335559685\":720,\"335559991\":360,\"469769226\":\"Symbol\",\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\uf0b7\",\"469777815\":\"hybridMultilevel\"}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">95% are financially driven.<\/span><span data-ccp-props=\"{\"134233117\":false,\"134233118\":false,\"201341983\":0,\"335551550\":1,\"335551620\":1,\"335559737\":0,\"335559738\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/li><\/ul><h2><b><span data-contrast=\"auto\">Reverse engineering<\/span><\/b><span data-ccp-props=\"{\"134233117\":false,\"134233118\":false,\"201341983\":0,\"335551550\":1,\"335551620\":1,\"335559685\":0,\"335559737\":0,\"335559738\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/h2><p><span data-contrast=\"auto\">The National Cybersecurity Alliance suggests some incredibly simple behaviors to avoid becoming a victim of a social engineering, or any other kind of attack.<\/span><span data-ccp-props=\"{\"134233117\":false,\"134233118\":false,\"201341983\":0,\"335551550\":1,\"335551620\":1,\"335559685\":0,\"335559737\":0,\"335559738\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p><p><span style=\"color: #42768d;\"><b>Use strong passwords and enlist a password manager. <\/b><\/span><span data-contrast=\"auto\">The NCA says passwords should be long, unique and complex. They should be at least 12 characters. They should be unique \u2013 don't reuse them and none should look alike. They should also have a good mix of upper and lower cases, numbers and letters, and special characters. The National Institute of Standards and Technology recommends changing passwords every few months, too.<\/span><span data-ccp-props=\"{\"134233117\":false,\"134233118\":false,\"201341983\":0,\"335551550\":1,\"335551620\":1,\"335559685\":0,\"335559737\":0,\"335559738\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Password managers can help with this. They help manage hundreds of passwords for online accounts, protect a user\u2019s identity, notify users of potential phishing, and alert users when a password might be compromised.<\/span><span data-ccp-props=\"{\"134233117\":false,\"134233118\":false,\"201341983\":0,\"335551550\":1,\"335551620\":1,\"335559685\":0,\"335559737\":0,\"335559738\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p><p><span style=\"color: #42768d;\"><b>Turn on multifactor authentication. <\/b><\/span><span data-contrast=\"auto\">Although it probably seems like a simple solution, having two steps \u2013 or two passwords \u2013 to access online accounts simply doubles their security. These passwords can range from simple PINs (personal identification numbers) to security questions (What is your hometown?) to biometric identifiers such as facial or fingerprint identification.<\/span><span data-ccp-props=\"{\"134233117\":false,\"134233118\":false,\"201341983\":0,\"335551550\":1,\"335551620\":1,\"335559685\":0,\"335559737\":0,\"335559738\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p><p><span style=\"color: #42768d;\"><b>Recognize and report phishing. <\/b><\/span><span data-contrast=\"auto\">It might seem simple, but recognizing phishing is as simple as recognizing any other kind of fraud. Does it smell funny?<\/span><span data-ccp-props=\"{\"134233117\":false,\"134233118\":false,\"201341983\":0,\"335551550\":1,\"335551620\":1,\"335559685\":0,\"335559737\":0,\"335559738\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Does it:<\/span><span data-ccp-props=\"{\"134233117\":false,\"134233118\":false,\"201341983\":0,\"335551550\":1,\"335551620\":1,\"335559685\":0,\"335559737\":0,\"335559738\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p><ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{\"335552541\":1,\"335559684\":-2,\"335559685\":720,\"335559991\":360,\"469769226\":\"Symbol\",\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\uf0b7\",\"469777815\":\"hybridMultilevel\"}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Come from an unfamiliar source?<\/span><\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{\"335552541\":1,\"335559684\":-2,\"335559685\":720,\"335559991\":360,\"469769226\":\"Symbol\",\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\uf0b7\",\"469777815\":\"hybridMultilevel\"}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Have an offer that seems too good to be true?<\/span><span data-ccp-props=\"{\"134233117\":false,\"134233118\":false,\"201341983\":0,\"335551550\":1,\"335551620\":1,\"335559737\":0,\"335559738\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{\"335552541\":1,\"335559684\":-2,\"335559685\":720,\"335559991\":360,\"469769226\":\"Symbol\",\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\uf0b7\",\"469777815\":\"hybridMultilevel\"}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Ask for personal information?<\/span><span data-ccp-props=\"{\"134233117\":false,\"134233118\":false,\"201341983\":0,\"335551550\":1,\"335551620\":1,\"335559737\":0,\"335559738\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{\"335552541\":1,\"335559684\":-2,\"335559685\":720,\"335559991\":360,\"469769226\":\"Symbol\",\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\uf0b7\",\"469777815\":\"hybridMultilevel\"}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Stress urgency and ask for users to click on unfamiliar links or open attachments?<\/span><span data-ccp-props=\"{\"134233117\":false,\"134233118\":false,\"201341983\":0,\"335551550\":1,\"335551620\":1,\"335559737\":0,\"335559738\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{\"335552541\":1,\"335559684\":-2,\"335559685\":720,\"335559991\":360,\"469769226\":\"Symbol\",\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\uf0b7\",\"469777815\":\"hybridMultilevel\"}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Or just not look right? Misspellings, odd language, strange email address.<\/span><span data-ccp-props=\"{\"134233117\":false,\"134233118\":false,\"201341983\":0,\"335551550\":1,\"335551620\":1,\"335559737\":0,\"335559738\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/li><\/ul><p><span data-contrast=\"auto\">If it does, do with it what you would do with any bad fish \u2013 trash it and\/or report it. Most good IT managers have a way to report phishy emails.<\/span><span data-ccp-props=\"{\"134233117\":false,\"134233118\":false,\"201341983\":0,\"335551550\":1,\"335551620\":1,\"335559685\":0,\"335559737\":0,\"335559738\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p><p><span style=\"color: #42768d;\"><b>Update software. <\/b><\/span><span data-contrast=\"auto\">Software companies update their products for several reasons, and one is to keep them and their users safe. That\u2019s why it\u2019s always important to update whenever asked, although only download updates if they come from your provider. They can contain malware and viruses just like any phishing product.<\/span><span data-ccp-props=\"{\"134233117\":false,\"134233118\":false,\"201341983\":0,\"335551550\":1,\"335551620\":1,\"335559685\":0,\"335559737\":0,\"335559738\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Point of sale and retail management software providers often offer services to manage their products and make life easier for their customers.\u00a0<\/span><span data-ccp-props=\"{\"134233117\":false,\"134233118\":false,\"201341983\":0,\"335551550\":1,\"335551620\":1,\"335559685\":0,\"335559737\":0,\"335559738\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Updates are often required to maintain PCI compliance which keeps stores operating safely.<\/span><span data-ccp-props=\"{\"134233117\":false,\"134233118\":false,\"201341983\":0,\"335551550\":1,\"335551620\":1,\"335559685\":0,\"335559737\":0,\"335559738\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p><p><span class=\"TextRun SCXW247818290 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW247818290 BCX0\">\u201cWindows <\/span><span class=\"NormalTextRun SCXW247818290 BCX0\">u<\/span><span class=\"NormalTextRun SCXW247818290 BCX0\">pdates are extremely important. If users <\/span><span class=\"NormalTextRun SCXW247818290 BCX0\">don\u2019t<\/span><span class=\"NormalTextRun SCXW247818290 BCX0\"> update their software regularly, <\/span><span class=\"NormalTextRun SCXW247818290 BCX0\">they\u2019re<\/span><span class=\"NormalTextRun SCXW247818290 BCX0\"> just making it easier for <\/span><span class=\"NormalTextRun SCXW247818290 BCX0\">bad guys to get in there and do something,\u201d says Brandon Hays, Managed Services Lead for <a href=\"https:\/\/paladinpointofsale.com\/managed-services\/\" target=\"_blank\" rel=\"noopener\">\u00a0Paladin Data Corporation<\/a>, a leading provider of retail management<\/span><span class=\"NormalTextRun SCXW247818290 BCX0\"> software solutions. \u201cThat said, Windows updates is set to auto<\/span><span class=\"NormalTextRun SCXW247818290 BCX0\">matically install by default. That means <\/span><span class=\"NormalTextRun SCXW247818290 BCX0\">it\u2019s<\/span><span class=\"NormalTextRun SCXW247818290 BCX0\"> going to install whenever it wants <\/span><span class=\"NormalTextRun SCXW247818290 BCX0\">to,<\/span><span class=\"NormalTextRun SCXW247818290 BCX0\"> and it requires a reboot to complete the installation.<\/span><\/span><\/p><hr \/><p><span style=\"color: #42768d;\"><span class=\"TextRun SCXW247818290 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW247818290 BCX0\">\"If a store is in the mi<\/span><span class=\"NormalTextRun SCXW247818290 BCX0\">ddle of ringing up a sale and <\/span><span class=\"NormalTextRun SCXW247818290 BCX0\">there\u2019s<\/span><span class=\"NormalTextRun SCXW247818290 BCX0\"> 10 people in line and the server decides to start a Windows update, that store goes down<\/span><span class=\"NormalTextRun SCXW247818290 BCX0\"> until the update is complete<\/span><span class=\"NormalTextRun SCXW247818290 BCX0\">.<\/span> <span class=\"NormalTextRun SCXW247818290 BCX0\">That\u2019s<\/span><span class=\"NormalTextRun SCXW247818290 BCX0\"> why we introduced Paladin Managed Updates\u2122. We have a solution to control Windows updates in a way that <\/span><span class=\"NormalTextRun SCXW247818290 BCX0\">it\u2019s<\/span><span class=\"NormalTextRun SCXW247818290 BCX0\"> not interfering with business operations.<\/span><span class=\"NormalTextRun SCXW247818290 BCX0\">\u201d<\/span><\/span><span class=\"EOP SCXW247818290 BCX0\" data-ccp-props=\"{\"134233117\":false,\"134233118\":false,\"201341983\":0,\"335551550\":1,\"335551620\":1,\"335559685\":0,\"335559737\":0,\"335559738\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/span><\/p><hr \/><p><span data-contrast=\"auto\">Managed Updates\u2122 is a product that verifies and tests software updates and either blocks them, if they can\u2019t be verified, or schedules them for downloads after business hours. This prevents distracting update popup messages from slowing down business operations.<\/span><span data-ccp-props=\"{\"134233117\":false,\"134233118\":false,\"201341983\":0,\"335551550\":1,\"335551620\":1,\"335559685\":0,\"335559737\":0,\"335559738\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p><h2>Low Tech Attacks, High Quality Response<\/h2><p><span data-contrast=\"auto\">Not every cyberattack requires a team of coders or loads of technical knowledge. Anyone with a phone, a little bit of research, some knowledge of protocols, and a little bit of audacity can gain access to a business\u2019s network.<\/span><span data-ccp-props=\"{\"201341983\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Earlier this year, one hardware store received a call from a person who claimed to be with the company that provided his store\u2019s technical support. The caller said he was responding to a help request and asked for the store\u2019s support credentials and password. If the employee had surrendered that information, the caller, using a remote monitoring and management program, would have gained access to the store\u2019s network where they could have turned that business upside down.<\/span><span data-ccp-props=\"{\"201341983\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Luckily for the store, the astute employee was suspicious that a support technician would need that kind of information. He phoned his store\u2019s technology provider to find out if there was any kind of support request. He found out there were no outstanding help requests and, in doing so, saved his store a big headache that could have ended in lost data or worse.<\/span><span data-ccp-props=\"{\"201341983\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p><p><span class=\"TextRun SCXW186394563 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW186394563 BCX0\">\u201cMost of our clients are small, independent business owners. They have just a few computer terminals. They <\/span><span class=\"NormalTextRun SCXW186394563 BCX0\">don\u2019t<\/span><span class=\"NormalTextRun SCXW186394563 BCX0\"> have enough resources for an IT departm<\/span><span class=\"NormalTextRun SCXW186394563 BCX0\">ent, which covers antivirus, backup solutions, and general network management. <\/span><span class=\"NormalTextRun SCXW186394563 BCX0\">That\u2019s<\/span><span class=\"NormalTextRun SCXW186394563 BCX0\"> where we can help. <\/span><span class=\"NormalTextRun SCXW186394563 BCX0\">We\u2019re<\/span><span class=\"NormalTextRun SCXW186394563 BCX0\"> the IT guys. Our Managed Services handles those ch<\/span><span class=\"NormalTextRun SCXW186394563 BCX0\">ores for these businesses, plus we take care of their point-of-sale software and system,\u201d Hays explains.<\/span><\/span><span class=\"EOP SCXW186394563 BCX0\" data-ccp-props=\"{\"201341983\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">This story is proof that a little bit of skepticism about everything from answering a phone call to responding to an email is a good thing. It\u2019s also proof that a relatively new category of cybercrime \u2013 social engineering \u2013 is spreading like a virus.<\/span><span data-ccp-props=\"{\"134233117\":false,\"134233118\":false,\"201341983\":0,\"335551550\":1,\"335551620\":1,\"335559685\":0,\"335559737\":0,\"335559738\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p>","_et_gb_content_width":"","footnotes":""},"categories":[3,16,4],"tags":[152,153,93,276,100],"class_list":["post-29557","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-all-posts","category-how-tos","category-industry-news","tag-cybersecurity","tag-cybersecurity-awareness-month","tag-paladin-data-corporation","tag-phishing","tag-retail-technology","et-has-post-format-content","et_post_format-et-post-format-standard"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Retail is a Choice Target for Social Engineering - Retail Science<\/title>\n<meta name=\"description\" content=\"Because of the amount of customer data retailers collect, stores have become the No. 1 target of cybercriminals using social engineering.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/paladinpointofsale.com\/retailscience\/home\/social-engineering-is-targeting-retail\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Retail is a Choice Target for Social Engineering - Retail Science\" \/>\n<meta property=\"og:description\" content=\"Because of the amount of customer data retailers collect, stores have become the No. 1 target of cybercriminals using social engineering.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/paladinpointofsale.com\/retailscience\/home\/social-engineering-is-targeting-retail\/\" \/>\n<meta property=\"og:site_name\" content=\"Retail Science\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/paladindatacorp\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-27T15:45:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-22T22:06:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/paladinpointofsale.com\/retailscience\/wp-content\/uploads\/sites\/2\/2023\/09\/RS-October23_CyberSignIn-600.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Brian Bullock\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@paladindatacorp\" \/>\n<meta name=\"twitter:site\" content=\"@paladindatacorp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Brian Bullock\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/paladinpointofsale.com\\\/retailscience\\\/home\\\/social-engineering-is-targeting-retail\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/paladinpointofsale.com\\\/retailscience\\\/home\\\/social-engineering-is-targeting-retail\\\/\"},\"author\":{\"name\":\"Brian Bullock\",\"@id\":\"https:\\\/\\\/paladinpointofsale.com\\\/retailscience\\\/home\\\/#\\\/schema\\\/person\\\/e5b5b4a78ded2bf74f8b4ca69f2a0518\"},\"headline\":\"Retail is a Choice Target for Social Engineering\",\"datePublished\":\"2023-09-27T15:45:22+00:00\",\"dateModified\":\"2025-09-22T22:06:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/paladinpointofsale.com\\\/retailscience\\\/home\\\/social-engineering-is-targeting-retail\\\/\"},\"wordCount\":3725,\"image\":{\"@id\":\"https:\\\/\\\/paladinpointofsale.com\\\/retailscience\\\/home\\\/social-engineering-is-targeting-retail\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/paladinpointofsale.com\\\/retailscience\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/09\\\/RS-October23_CyberSignIn-600.jpg\",\"keywords\":[\"cybersecurity\",\"Cybersecurity Awareness Month\",\"Paladin Data Corporation\",\"phishing\",\"retail technology\"],\"articleSection\":[\"All Posts\",\"How-To's\",\"Industry News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/paladinpointofsale.com\\\/retailscience\\\/home\\\/social-engineering-is-targeting-retail\\\/\",\"url\":\"https:\\\/\\\/paladinpointofsale.com\\\/retailscience\\\/home\\\/social-engineering-is-targeting-retail\\\/\",\"name\":\"Retail is a Choice Target for Social Engineering - Retail Science\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/paladinpointofsale.com\\\/retailscience\\\/home\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/paladinpointofsale.com\\\/retailscience\\\/home\\\/social-engineering-is-targeting-retail\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/paladinpointofsale.com\\\/retailscience\\\/home\\\/social-engineering-is-targeting-retail\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/paladinpointofsale.com\\\/retailscience\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/09\\\/RS-October23_CyberSignIn-600.jpg\",\"datePublished\":\"2023-09-27T15:45:22+00:00\",\"dateModified\":\"2025-09-22T22:06:52+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/paladinpointofsale.com\\\/retailscience\\\/home\\\/#\\\/schema\\\/person\\\/e5b5b4a78ded2bf74f8b4ca69f2a0518\"},\"description\":\"Because of the amount of customer data retailers collect, stores have become the No. 1 target of cybercriminals using social engineering.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/paladinpointofsale.com\\\/retailscience\\\/home\\\/social-engineering-is-targeting-retail\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/paladinpointofsale.com\\\/retailscience\\\/home\\\/social-engineering-is-targeting-retail\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/paladinpointofsale.com\\\/retailscience\\\/home\\\/social-engineering-is-targeting-retail\\\/#primaryimage\",\"url\":\"https:\\\/\\\/paladinpointofsale.com\\\/retailscience\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/09\\\/RS-October23_CyberSignIn-600.jpg\",\"contentUrl\":\"https:\\\/\\\/paladinpointofsale.com\\\/retailscience\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/09\\\/RS-October23_CyberSignIn-600.jpg\",\"width\":600,\"height\":300,\"caption\":\"Images of a computer screen with log in information.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/paladinpointofsale.com\\\/retailscience\\\/home\\\/social-engineering-is-targeting-retail\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/paladinpointofsale.com\\\/retailscience\\\/home\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Retail is a Choice Target for Social Engineering\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/paladinpointofsale.com\\\/retailscience\\\/home\\\/#website\",\"url\":\"https:\\\/\\\/paladinpointofsale.com\\\/retailscience\\\/home\\\/\",\"name\":\"Retail Science\",\"description\":\"Intelligent Research for Retailers\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/paladinpointofsale.com\\\/retailscience\\\/home\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/paladinpointofsale.com\\\/retailscience\\\/home\\\/#\\\/schema\\\/person\\\/e5b5b4a78ded2bf74f8b4ca69f2a0518\",\"name\":\"Brian Bullock\",\"url\":\"https:\\\/\\\/paladinpointofsale.com\\\/retailscience\\\/home\\\/author\\\/brianbullock\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Retail is a Choice Target for Social Engineering - Retail Science","description":"Because of the amount of customer data retailers collect, stores have become the No. 1 target of cybercriminals using social engineering.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/paladinpointofsale.com\/retailscience\/home\/social-engineering-is-targeting-retail\/","og_locale":"en_US","og_type":"article","og_title":"Retail is a Choice Target for Social Engineering - Retail Science","og_description":"Because of the amount of customer data retailers collect, stores have become the No. 1 target of cybercriminals using social engineering.","og_url":"https:\/\/paladinpointofsale.com\/retailscience\/home\/social-engineering-is-targeting-retail\/","og_site_name":"Retail Science","article_publisher":"https:\/\/www.facebook.com\/paladindatacorp\/","article_published_time":"2023-09-27T15:45:22+00:00","article_modified_time":"2025-09-22T22:06:52+00:00","og_image":[{"width":600,"height":300,"url":"https:\/\/paladinpointofsale.com\/retailscience\/wp-content\/uploads\/sites\/2\/2023\/09\/RS-October23_CyberSignIn-600.jpg","type":"image\/jpeg"}],"author":"Brian Bullock","twitter_card":"summary_large_image","twitter_creator":"@paladindatacorp","twitter_site":"@paladindatacorp","twitter_misc":{"Written by":"Brian Bullock","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/paladinpointofsale.com\/retailscience\/home\/social-engineering-is-targeting-retail\/#article","isPartOf":{"@id":"https:\/\/paladinpointofsale.com\/retailscience\/home\/social-engineering-is-targeting-retail\/"},"author":{"name":"Brian Bullock","@id":"https:\/\/paladinpointofsale.com\/retailscience\/home\/#\/schema\/person\/e5b5b4a78ded2bf74f8b4ca69f2a0518"},"headline":"Retail is a Choice Target for Social Engineering","datePublished":"2023-09-27T15:45:22+00:00","dateModified":"2025-09-22T22:06:52+00:00","mainEntityOfPage":{"@id":"https:\/\/paladinpointofsale.com\/retailscience\/home\/social-engineering-is-targeting-retail\/"},"wordCount":3725,"image":{"@id":"https:\/\/paladinpointofsale.com\/retailscience\/home\/social-engineering-is-targeting-retail\/#primaryimage"},"thumbnailUrl":"https:\/\/paladinpointofsale.com\/retailscience\/wp-content\/uploads\/sites\/2\/2023\/09\/RS-October23_CyberSignIn-600.jpg","keywords":["cybersecurity","Cybersecurity Awareness Month","Paladin Data Corporation","phishing","retail technology"],"articleSection":["All Posts","How-To's","Industry News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/paladinpointofsale.com\/retailscience\/home\/social-engineering-is-targeting-retail\/","url":"https:\/\/paladinpointofsale.com\/retailscience\/home\/social-engineering-is-targeting-retail\/","name":"Retail is a Choice Target for Social Engineering - Retail Science","isPartOf":{"@id":"https:\/\/paladinpointofsale.com\/retailscience\/home\/#website"},"primaryImageOfPage":{"@id":"https:\/\/paladinpointofsale.com\/retailscience\/home\/social-engineering-is-targeting-retail\/#primaryimage"},"image":{"@id":"https:\/\/paladinpointofsale.com\/retailscience\/home\/social-engineering-is-targeting-retail\/#primaryimage"},"thumbnailUrl":"https:\/\/paladinpointofsale.com\/retailscience\/wp-content\/uploads\/sites\/2\/2023\/09\/RS-October23_CyberSignIn-600.jpg","datePublished":"2023-09-27T15:45:22+00:00","dateModified":"2025-09-22T22:06:52+00:00","author":{"@id":"https:\/\/paladinpointofsale.com\/retailscience\/home\/#\/schema\/person\/e5b5b4a78ded2bf74f8b4ca69f2a0518"},"description":"Because of the amount of customer data retailers collect, stores have become the No. 1 target of cybercriminals using social engineering.","breadcrumb":{"@id":"https:\/\/paladinpointofsale.com\/retailscience\/home\/social-engineering-is-targeting-retail\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/paladinpointofsale.com\/retailscience\/home\/social-engineering-is-targeting-retail\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/paladinpointofsale.com\/retailscience\/home\/social-engineering-is-targeting-retail\/#primaryimage","url":"https:\/\/paladinpointofsale.com\/retailscience\/wp-content\/uploads\/sites\/2\/2023\/09\/RS-October23_CyberSignIn-600.jpg","contentUrl":"https:\/\/paladinpointofsale.com\/retailscience\/wp-content\/uploads\/sites\/2\/2023\/09\/RS-October23_CyberSignIn-600.jpg","width":600,"height":300,"caption":"Images of a computer screen with log in information."},{"@type":"BreadcrumbList","@id":"https:\/\/paladinpointofsale.com\/retailscience\/home\/social-engineering-is-targeting-retail\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/paladinpointofsale.com\/retailscience\/home\/"},{"@type":"ListItem","position":2,"name":"Retail is a Choice Target for Social Engineering"}]},{"@type":"WebSite","@id":"https:\/\/paladinpointofsale.com\/retailscience\/home\/#website","url":"https:\/\/paladinpointofsale.com\/retailscience\/home\/","name":"Retail Science","description":"Intelligent Research for Retailers","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/paladinpointofsale.com\/retailscience\/home\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/paladinpointofsale.com\/retailscience\/home\/#\/schema\/person\/e5b5b4a78ded2bf74f8b4ca69f2a0518","name":"Brian Bullock","url":"https:\/\/paladinpointofsale.com\/retailscience\/home\/author\/brianbullock\/"}]}},"_links":{"self":[{"href":"https:\/\/paladinpointofsale.com\/retailscience\/home\/wp-json\/wp\/v2\/posts\/29557","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/paladinpointofsale.com\/retailscience\/home\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/paladinpointofsale.com\/retailscience\/home\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/paladinpointofsale.com\/retailscience\/home\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/paladinpointofsale.com\/retailscience\/home\/wp-json\/wp\/v2\/comments?post=29557"}],"version-history":[{"count":0,"href":"https:\/\/paladinpointofsale.com\/retailscience\/home\/wp-json\/wp\/v2\/posts\/29557\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/paladinpointofsale.com\/retailscience\/home\/wp-json\/wp\/v2\/media\/29558"}],"wp:attachment":[{"href":"https:\/\/paladinpointofsale.com\/retailscience\/home\/wp-json\/wp\/v2\/media?parent=29557"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/paladinpointofsale.com\/retailscience\/home\/wp-json\/wp\/v2\/categories?post=29557"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/paladinpointofsale.com\/retailscience\/home\/wp-json\/wp\/v2\/tags?post=29557"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}