Skip to content

Hacked by Trust: The Human Side of Cybersecurity

    /*! elementor – v3.4.8 – 16-11-2021 */
    .elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#818a91;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#818a91;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}

    In today’s fast-paced digital world, simply having a Facebook or Instagram account isn’t enough to create a strong online presence. Social media is great for engagement and reaching audiences, but your business needs a home. You need a solid digital HQ that works for you around the clock. 

     

    That’s where a website comes in. 

     

    Your website is your most powerful marketing tool. It builds trust, increases visibility, and helps turn curious visitors into loyal customers. If you’re still unsure whether you really need one, here’s why a website is essential for your business, even if you’re doing well on social media.

    /*! elementor – v3.4.8 – 16-11-2021 */
    .elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}

    1. Real Case :
    When Email Trust Gets Hijacked

    /*! elementor – v3.4.8 – 16-11-2021 */
    .elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=”.svg”]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}

    Everything looked normal… until the money disappeared.

    1. Employee email account is compromised by the cybercriminal
    2. Compromised account used to notify the supplier’s customers of a change to the invoice payment details
    3. Customer transfers their payment to the cybercriminal’s account
    4. Cybercriminal receives the money

     

    How one compromised email can do serious damage — not just from a tech side, but also from human and process gaps.

    2. Breaking It Down:
    Shared Responsibility & Legal Aspects

    Type of Security Issues

    Type of Security Issues

    Not a technical issue — it’s a mix of human mistakes, weak processes, and missing controls.

     

    1. On human side:

    • Customer trusted email instructions without independent verification.

     

    2. On process side:

    • No secondary confirmation or approval workflow for financial transactions.

     

    3. Technical gap:

    • Weak authentication (no MFA)
    • Poor mailbox monitoring
    • Lack of anomaly alerts

    3. Humans as the New Perimeter:
    Why People Get Targeted

    Shared Responsibility

    Shared Responsibility

    Everyone has a role.

     

    1. Company:

    • Protect corporate email accounts;
    • Enforce MFA;
    • Train staff;
    • Maintain audit logs.
     
    Example of Negligence:

    Failed to secure or detect compromised account.

     

    2. Customer:

    • Verify payment details via alternate or verified channels.
     
    Example of Negligence:

    Trusted unverified payment instructions.

     

    3. Email Provider:

    • Provide secure infrastructure and detection tools.

     

    Example of Negligence:

    Limited liability if compromise stemmed from weak user control.

    4. How Hackers Hack Humans:
    Social Engineering in Action

    Phish

    Attack MethodHow It WorksCommon Example
    Phishing / Credential TheftFake email or malicious link used to steal login details“Reset your password here”
    PretextingHacker pretends to be IT support, HR, or another authority figure“I need your OTP to fix your account”
    Session HijackAttackers steal cookies or tokens to access accounts without passwordsStay logged in without password
    Business Email Compromise (BEC)Criminal impersonates a colleague or boss to request payments“Urgent wire transfer request”

    Phishing email

    5. Insider Threats:
    “It All Started With One USB Drive”

    • Employee finds a USB labeled “Salary Reports”.
    • Out of Curiosity → plugs it into a company PC.
    • Malware executes automatically.
    • Spreads via internal network shares.
    • Entire network compromised within hours.

    Not All Insiders Are Bad — But All Can Cause Damage

    CategoryDescriptionExample
    MaliciousIntentionally cause harmDisgruntled employee
    NegligentMistakes, poor judgmentClicks phishing link
    CompromisedAccount hijackedAttacker uses real credentials

    6. Building the Human Firewall: Awareness, Habits & Culture

    Shared Responsibility

    This wasn’t a “hacker vs. firewall” problem.

    It was a people + process + technology failure.

    Technology alone is not enough. The strongest organizations succeed by combining:

    LayerKey ActionsExample Practice
    IndividualVerify before you trustConfirm payment changes
    TechnicalMFA, disable autorunPrevent USB auto-execution
    NetworkSegmentation, monitoringLimit damage spread
    CultureAwareness & reporting“Report, don’t hide mistakes”

    A truly secure system is built on human behavior, not just hardware.

    Final Thoughts: Cybersecurity

    Cybersecurity isn’t just about systems — it’s about people. Most breaches happen because trust is exploited, not because technology fails. With the right habits, verification steps, and awareness, these mistakes can be avoided.

     

    At Zoewebs, we help businesses stay safer online by combining secure digital setups with practical guidance that strengthens the human side of cybersecurity. If you need support tightening your digital protection, we’re here to help.

    How can Zoewebs helps?

    /*! elementor-pro – v3.5.2 – 28-11-2021 */
    .elementor-button.elementor-hidden,.elementor-hidden{display:none}.e-form__step{width:100%}.e-form__step:not(.elementor-hidden){display:-webkit-box;display:-ms-flexbox;display:flex;-ms-flex-wrap:wrap;flex-wrap:wrap}.e-form__buttons{-ms-flex-wrap:wrap;flex-wrap:wrap}.e-form__buttons,.e-form__buttons__wrapper{display:-webkit-box;display:-ms-flexbox;display:flex}.e-form__indicators{-webkit-box-pack:justify;-ms-flex-pack:justify;justify-content:space-between;-ms-flex-wrap:nowrap;flex-wrap:nowrap;font-size:13px;margin-bottom:var(–e-form-steps-indicators-spacing)}.e-form__indicators,.e-form__indicators__indicator{display:-webkit-box;display:-ms-flexbox;display:flex;-webkit-box-align:center;-ms-flex-align:center;align-items:center}.e-form__indicators__indicator{-webkit-box-orient:vertical;-webkit-box-direction:normal;-ms-flex-direction:column;flex-direction:column;-webkit-box-pack:center;-ms-flex-pack:center;justify-content:center;-ms-flex-preferred-size:0;flex-basis:0;padding:0 var(–e-form-steps-divider-gap)}.e-form__indicators__indicator__progress{width:100%;position:relative;background-color:var(–e-form-steps-indicator-progress-background-color);border-radius:var(–e-form-steps-indicator-progress-border-radius);overflow:hidden}.e-form__indicators__indicator__progress__meter{width:var(–e-form-steps-indicator-progress-meter-width,0);height:var(–e-form-steps-indicator-progress-height);line-height:var(–e-form-steps-indicator-progress-height);padding-right:15px;border-radius:var(–e-form-steps-indicator-progress-border-radius);background-color:var(–e-form-steps-indicator-progress-color);color:var(–e-form-steps-indicator-progress-meter-color);text-align:right;-webkit-transition:width .1s linear;-o-transition:width .1s linear;transition:width .1s linear}.e-form__indicators__indicator:first-child{padding-left:0}.e-form__indicators__indicator:last-child{padding-right:0}.e-form__indicators__indicator–state-inactive{color:var(–e-form-steps-indicator-inactive-primary-color,#c2cbd2)}.e-form__indicators__indicator–state-inactive [class*=indicator–shape-]:not(.e-form__indicators__indicator–shape-none){background-color:var(–e-form-steps-indicator-inactive-secondary-color,#fff)}.e-form__indicators__indicator–state-inactive object,.e-form__indicators__indicator–state-inactive svg{fill:var(–e-form-steps-indicator-inactive-primary-color,#c2cbd2)}.e-form__indicators__indicator–state-active{color:var(–e-form-steps-indicator-active-primary-color,#39b54a);border-color:var(–e-form-steps-indicator-active-secondary-color,#fff)}.e-form__indicators__indicator–state-active [class*=indicator–shape-]:not(.e-form__indicators__indicator–shape-none){background-color:var(–e-form-steps-indicator-active-secondary-color,#fff)}.e-form__indicators__indicator–state-active object,.e-form__indicators__indicator–state-active svg{fill:var(–e-form-steps-indicator-active-primary-color,#39b54a)}.e-form__indicators__indicator–state-completed{color:var(–e-form-steps-indicator-completed-secondary-color,#fff)}.e-form__indicators__indicator–state-completed [class*=indicator–shape-]:not(.e-form__indicators__indicator–shape-none){background-color:var(–e-form-steps-indicator-completed-primary-color,#39b54a)}.e-form__indicators__indicator–state-completed .e-form__indicators__indicator__label{color:var(–e-form-steps-indicator-completed-primary-color,#39b54a)}.e-form__indicators__indicator–state-completed .e-form__indicators__indicator–shape-none{color:var(–e-form-steps-indicator-completed-primary-color,#39b54a);background-color:initial}.e-form__indicators__indicator–state-completed object,.e-form__indicators__indicator–state-completed svg{fill:var(–e-form-steps-indicator-completed-secondary-color,#fff)}.e-form__indicators__indicator__icon{width:var(–e-form-steps-indicator-padding,30px);height:var(–e-form-steps-indicator-padding,30px);font-size:var(–e-form-steps-indicator-icon-size);border-width:1px;border-style:solid;display:-webkit-box;display:-ms-flexbox;display:flex;-webkit-box-pack:center;-ms-flex-pack:center;justify-content:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;overflow:hidden;margin-bottom:10px}.e-form__indicators__indicator__icon img,.e-form__indicators__indicator__icon object,.e-form__indicators__indicator__icon svg{width:var(–e-form-steps-indicator-icon-size);height:auto}.e-form__indicators__indicator__icon .e-font-icon-svg{height:1em}.e-form__indicators__indicator__number{width:var(–e-form-steps-indicator-padding,30px);height:var(–e-form-steps-indicator-padding,30px);border-width:1px;border-style:solid;display:-webkit-box;display:-ms-flexbox;display:flex;-webkit-box-pack:center;-ms-flex-pack:center;justify-content:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;margin-bottom:10px}.e-form__indicators__indicator–shape-circle{border-radius:50%}.e-form__indicators__indicator–shape-square{border-radius:0}.e-form__indicators__indicator–shape-rounded{border-radius:5px}.e-form__indicators__indicator–shape-none{border:0}.e-form__indicators__indicator__label{text-align:center}.e-form__indicators__indicator__separator{width:100%;height:var(–e-form-steps-divider-width);background-color:#c2cbd2}.e-form__indicators–type-icon,.e-form__indicators–type-icon_text,.e-form__indicators–type-number,.e-form__indicators–type-number_text{-webkit-box-align:start;-ms-flex-align:start;align-items:flex-start}.e-form__indicators–type-icon .e-form__indicators__indicator__separator,.e-form__indicators–type-icon_text .e-form__indicators__indicator__separator,.e-form__indicators–type-number .e-form__indicators__indicator__separator,.e-form__indicators–type-number_text .e-form__indicators__indicator__separator{margin-top:calc(var(–e-form-steps-indicator-padding, 30px) / 2 – var(–e-form-steps-divider-width, 1px) / 2)}.elementor-field-type-hidden{display:none}.elementor-field-type-html{display:inline-block}.elementor-login .elementor-lost-password,.elementor-login .elementor-remember-me{font-size:.85em}.elementor-field-type-recaptcha_v3 .elementor-field-label{display:none}.elementor-field-type-recaptcha_v3 .grecaptcha-badge{z-index:1}.elementor-button .elementor-form-spinner{-webkit-box-ordinal-group:4;-ms-flex-order:3;order:3}.elementor-form .elementor-button>span{display:-webkit-box;display:-ms-flexbox;display:flex;-webkit-box-pack:center;-ms-flex-pack:center;justify-content:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center}.elementor-form .elementor-button .elementor-button-text{white-space:normal;-webkit-box-flex:0;-ms-flex-positive:0;flex-grow:0}.elementor-form .elementor-button svg{height:auto}.elementor-form .elementor-button .e-font-icon-svg{height:1em}

    www.zoewebs.com (Article Sourced Website)

    #Hacked #Trust #Human #Side #Cybersecurity