-
Featured services
Think beyond the robots
The successful integration of AI and IoT in manufacturing will depend on effective change management, upskilling and rethinking business models.
Read the blog -
Services
Leverage our capabilities to accelerate your business transformation.
-
Services
Network Services
Popular Products
-
Private 5G
Our turnkey private 5G network enables custom-built solutions that are designed around unique use cases and strategies, and deployed, run and optimized through a full network-as-a-service model.
-
Managed Campus Networks
Our Managed Campus Networks services transform campus networks, corporate area networks and interconnected local area networks, and connect smart places and industries.
-
-
Services
Cloud
Popular Products
-
Cloud Architecture and Modernization
Discover how to achieve your business goals through cloud modernization practices, that deliver improved agility, reusability and scalability.
-
Cloud Optimization
Discover how to maximize operational excellence, business continuity and financial sustainability through our cloud-advanced optimization services.
-
-
Services
Consulting
-
-
Services
Data and Artificial intelligence
-
Services
Technology Solutions
Client stories
-
Services
Data Center Services
-
Services
CX and Design
-
Services
Application Services
-
Services
Sustainability Services
-
Services
Digital Workplace
-
Services
Business Process Solutions
Master your GenAI destiny
We’ll help you navigate the complexities and opportunities of GenAI.
Explore GenAI -
-
-
Insights
Recent Insights
-
The Future of Networking in 2025 and Beyond
-
Using the cloud to cut costs needs the right approach
When organizations focus on transformation, a move to the cloud can deliver cost savings – but they often need expert advice to help them along their journey
-
Make zero trust security work for your organization
Make zero trust security work for your organization across hybrid work environments.
-
-
Master your GenAI destiny
We’ll help you navigate the complexities and opportunities of GenAI.
Explore GenAI -
-
Master your GenAI destiny
We’ll help you navigate the complexities and opportunities of GenAI.
Explore GenAI -
Discover how we accelerate your business transformation
-
About us
CLIENT STORIES
-
Liantis
Over time, Liantis – an established HR company in Belgium – had built up data islands and isolated solutions as part of their legacy system.
-
Randstad
We ensured that Randstad’s migration to Genesys Cloud CX had no impact on availability, ensuring an exceptional user experience for clients and talent.
-
-
CLIENT STORIES
-
Liantis
Over time, Liantis – an established HR company in Belgium – had built up data islands and isolated solutions as part of their legacy system.
-
Randstad
We ensured that Randstad’s migration to Genesys Cloud CX had no impact on availability, ensuring an exceptional user experience for clients and talent.
-
-
CLIENT STORIES
-
Liantis
Over time, Liantis – an established HR company in Belgium – had built up data islands and isolated solutions as part of their legacy system.
-
Randstad
We ensured that Randstad’s migration to Genesys Cloud CX had no impact on availability, ensuring an exceptional user experience for clients and talent.
-
Everest Group PEAK Matrix® Assessment
NTT DATA is a Leader and Star Performer in the Everest Group Sustainability Enablement Technology Services PEAK Matrix® Assessment 2024.
Get the Everest report -
- Careers
Social engineering threats during the health pandemic
20 May 2020
Topics in this article
The current COVID-19 pandemic has much of the workforce and pretty much all students working and studying from home. This, coupled with travel restrictions and stay-at-home orders in many jurisdictions, have most society restricted to their residences.
Many are increasingly seeking entertainment and a means to socialize with family and friends they can’t visit with in-person. When people get bored, they tend to turn to the internet and specifically to social media. Boredom and the feeling of safety and comfort within their home can create an environment ripe for lax security practices and not following good cyber-hygiene.
Working from home
It’s also important to note that many workers may have their company-owned laptops, tablets, and other equipment connected remotely to their company’s network and servers with them. They may be using these work devices on social media while not subject to the same supervision that they would in their office. Many may feel safe using company equipment for personal use while working from the comfort of their home and without a manager nearby. This presents additional security concerns.
Some users may forget to follow, or not be aware of, company security policies when not in the office Social engineering ‘games’
All too frequently, questions are passed around on social media inviting friends and family to engage in the ‘game’ of answering personal questions. These are marketed as a means of getting to know one another better, to learn new things about your friends and to pass time. Unfortunately, these games can carry unforeseen risks. Providing truthful answers to question such as current occupation, favorite pet, first job, favourite food and first car provides a lot of information that can be used against you. Spammers can send unwelcome invitations they believe you would be interested in based on these answers. Attackers engaged in phishing campaigns can send targeted phishing emails tricking you into clicking on malicious links and attachments. Threat actors collect this data to aid in obtaining passwords and answering security questions.
This information, combined with other data available about each of us on the internet, exposes us to a greater risk of being victimized.
Protect your information
These questions that are passed around on social media are a form of social engineering and those forwarding requests to play these games don’t realize they are facilitating the misuse of this information. You can be tricked into providing information that could put you and your account credentials at risk. Threat groups collect this information and can use it to further whatever their illicit business objectives, whether using the information themselves, offering it for sale via illicit online forums (the dark web) or selling it other threat groups. Any of these can raise your risk to becoming the victim of identity theft and other financial crimes as well as placing your personal and work accounts at risk.
It’s a sad fact that scams, threats and other malicious activity increases during times of crisis. Those who seek to prey on the public will take advantage of those perceived to be vulnerable to attack. Remain vigilant and practice good cyber-hygiene to reduce the risk of becoming a victim and help protect those around you.