User Awareness Key Takeaways

Sectricity User Awareness Key Takeaways

Sectricity User Awareness Key Takeaways

User Awareness & Social Engineering

ProblemSolutionAlternative Solution
Quishing (QR phishing)Don't scan unknown QR codesForward suspicious ones to suspicious@safeonweb.be
Smishing (SMS phishing)Don't click links in suspicious SMSVerify directly via official app or website
Vishing (Voice phishing)Don't trust unknown callers asking for sensitive infoHang up and call back via official numbers
Phishing EmailsCheck sender and hover over linksReport suspicious emails to IT
Phishing URL tricks using "." and "-"Understand domain structure: login.paypal.com.evil.com = evil.comUse browser extensions or email gateways to detect fake URLs
Subdomain spoofingAttackers use subdomains like paypal.login.example.comOnly trust domains after the final dot before the TLD
Domain squattingMisspelled or hyphenated domains like pay-pal.com or rnicrosoft.comManually type URLs or use bookmarks
TLD abuseUsing other TLDs like bank-login.net instead of .comUse threat intelligence tools to block sketchy TLDs

Malware & Exploits

ProblemSolutionAlternative Solution
RansomwareKeep OS & software updatedUse anti-ransomware tools and offline backups
Macro malware (Office)Block macros from internet filesUse web-based viewers (Office 365/Google Docs)
USB malware (USB drops)Disable USB ports for unknown devicesUse endpoint detection to scan USB drives
Exploiting outdated softwarePatch management & regular updatesUse application allowlisting

Wi-Fi & Network Threats

ProblemSolutionAlternative Solution
Evil Twin / Rogue APsVerify network names; avoid auto-connectUse VPNs or mobile data for sensitive activity
Deauth attacks (Wi-Fi disconnects)Use WPA3 routersMonitor with Wi-Fi intrusion detection
Man-in-the-MiddleAvoid logging in to accounts on public Wi-FiUse encrypted DNS (DoH/DoT) and HTTPS
Weak encryption (WEP/WPA)Upgrade to WPA3Disable WPS and use complex passphrases

Web Attacks

ProblemSolutionAlternative Solution
Blind XSSSanitize all user inputUse CSP and secure cookies
Stored XSS in feedback forms or logsEncode output in admin panelsUse input whitelisting and audit logs
XSS 2FA BypassUse WebAuthn or hardware tokensStore tokens in HTTP-only cookies only
Malicious form injectionsValidate on server sideUse security headers and frontend filtering

Cloud & Infrastructure

ProblemSolutionAlternative Solution
Azure misconfigurationsAudit Azure roles and permissionsUse Azure Defender & conditional access policies
Privilege escalation in cloudFollow least privilege modelMonitor token activity and use alerts
Overprivileged service identitiesAssign only required rolesRotate credentials regularly and monitor usage
Public exposure of storage bucketsRestrict public access and enable loggingUse automation to scan for open buckets

Authentication & Password Security

ProblemSolutionAlternative Solution
Reused passwordsUse password managerEnforce different passwords via policy
Weak passwordsEnforce complexity + MFAUse passphrases instead of random characters
No MFAMandate MFA for all critical systemsUse hardware-based MFA like YubiKey
SMS-based 2FA phishingUse app-based 2FA (TOTP) or pushTransition to phishing-resistant methods like WebAuthn

Internet of Things (IoT)

ProblemSolutionAlternative Solution
Default credentials on smart devicesChange passwords on first setupDisable unused services and use VLANs
No firmware updatesEnable auto-update or manual scheduleReplace devices that no longer get updates
IoT exposed on public internetDisable UPnP, port forwardingUse internal firewall to block outbound access
Lack of monitoring on IoTUse network monitoring toolsSegment devices from main network

Artificial Intelligence & Privacy

ProblemSolutionAlternative Solution
Sharenting (oversharing kids' data online)Educate about digital footprintSet social media profiles to private
AI-generated deepfakesVerify info with trusted sourcesUse AI-detection plugins or manual checks
AI tools leaking company dataRestrict uploading to public LLMsUse private or on-prem AI models
Voice cloning / impersonationAvoid posting voice messages onlineUse liveness detection for verification