web-ip2g-pws.wpc.ntrs.com:1876
web-ip2g-pws.npc.ntrs.com:1876
10.89.5.158:1876
localhost:1876
localhost:1876
[x-akamai-config-log-detail] = [true]
[host] = [localhost:1776]
[accept-language] = [en-us,en-gb,en;q=0.7,*;q=0.3]
[via] = [1.0 v1-akamaitech.net(ghost) (AkamaiGHost), 1.1 akamai.net(ghost) (AkamaiGHost)]
[x-forwarded-for] = [54.166.224.46, 96.6.47.5, 204.188.136.10]
[accept] = [text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8]
[x-forwarded-host] = [www.northerntrust.com]
[user-agent] = [CCBot/2.0 (http://commoncrawl.org/faq/)]
[true-client-ip] = [54.166.224.46]
[max-forwards] = [10]
[pragma] = [no-cache]
[cache-control] = [no-cache, max-age=0]
[akamai-origin-hop] = [2]
[accept-encoding] = [gzip]
[x-forwarded-server] = [web-xp2b-pws.ntrs.com]

lsds,lscs,ecms,ultraseek,idc,exactTarget,passportloginform,forms,redFish
lsds,lscs,ecms,ultraseek,idc,exactTarget,passportloginform,forms,redFish
lsds,lscs,ecms,ultraseek,idc,exactTarget,passportloginform,forms,redFish
lsds,lscs,ecms,ultraseek,idc,exactTarget,passportloginform,forms,redFish
lsds,lscs,ecms,ultraseek,idc,exactTarget,passportloginform,forms,redFish
www.northerntrust.com
www.northerntrust.com
nt.uat.ntrs.com:12082
web-ip2i-pws.ntrs.com
web-ip2i-pws.ntrs.com
production
production
uat
production
production
templatedata/SiteWide/headInsertion/data/nt-bootstrap
RUNTIME-system,RUNTIME-uat,RUNTIME-production
up8139[345]
up5149[234]
ut.*
up8146[345]
up5171[789]
about-us/security-center/social-engineering
27632126851
3
nt


 
Northern Trust Logo
 

Social Engineering

 
.
 
 
 
 
 
 
 
 
.

Social Engineering is a term used to describe a collection of techniques used to manipulate people into divulging confidential information.  Social Engineers target humans – and often portray themselves as people in need of your help or people of authority in order to gain access to information they are not authorized to receive.

Social Engineering can occur via computers, phone calls, text messages, and even in-person. Protecting yourself against Social Engineering attacks is easier if you know the signs to watch for.

Types of Social Engineering Attacks:

  • Spoofed Websites
  • Social Media Fraud
  • Phishing/Spear Phishing
  • Smishing (fraud perpetrated through text messages)
  • Telephone Fraud

Remember, Social Engineers are clever and confident and seldom make mistakes.  They will appear to know just enough facts to SEEM legitimate, but are actually attempting to gain information for illicit purposes. To help reduce your risk of becoming a victim of Social Engineers:

  1. Always know with whom you are sharing your personal information;
  2. Discard your personal physical information securely;
  3. Ask questions and verify the information before you release any personal or financial information;
  4. Maintain appropriate security on your computers and mobile devices (anti-virus, anti-spyware, passwords, and personal firewalls);
  5. Beware of suspicious calls, e-mails, and general solicitations asking for money; do not wire money in response to a solicitation.

Learn More