iTnews
  • Home
  • News
  • Technology
  • Security

Audit: IRS employees susceptible to social engineering

By Marcia Savage on Mar 18, 2005 4:26PM

Employees at the Internal Revenue Service were apt to fall victim to social engineering scams, according to an audit by the Inspector General for Tax Administration.

Auditors placed phone calls to 100 IRS managers and employees, posing at IT helpdesk personnel needing help to fix a network problem. They were able to convince 35 employees to divulge their user account names and change their passwords.

"Using our test scenario, a hacker or disgruntled employee could obtain user names and passwords to gain unauthorized access to the IRS systems," according to the audit.

The audit was about a 50 percent improvement over a similar test the IG conducted in August 2001, but IRS employees need more security awareness, the IG said.

Daniel Galik, IRS chief of mission assurance and security services, said in a written response that his office agreed with the IG's recommendations that it boost security awareness about social engineering risks.

The IRS has incorporated the topic of social engineering into its mandatory online security awareness training and plans to issue periodic reminders to employees about the issue, he said.

www.treas.gov/tigta

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:
auditemployeesengineeringirssecuritysocialsusceptibleto

Partner Content

Avoiding CAPEX by making on-premise IT more cloud-like
Promoted Content Avoiding CAPEX by making on-premise IT more cloud-like
Why Genworth Australia embraced low-code software development
Promoted Content Why Genworth Australia embraced low-code software development
Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product
Promoted Content Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product
Security "mindset shift" needed to protect organisations
Promoted Content Security "mindset shift" needed to protect organisations

Sponsored Whitepapers

Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership

Events

  • Micro Focus Information Management & Governance (IM&G) Forum 2022
  • CRN Channel Meets: CyberSecurity Live Event
  • IoT Insights: Secure By Design for manufacturing
  • Cyber Security for Government Summit
  • Forrester Technology & Innovation Asia Pacific 2022
By Marcia Savage
Mar 18 2005
4:26PM
0 Comments

Related Articles

  • Monash University opens public bug bounty
  • Sophisticated ZuoRAT attack targets home workers
  • Routing security falling short in Australian, New Zealand networks
  • Uber ex-security chief must face fraud charges
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Qantas calls time on IBM, Fujitsu in tech modernisation

Qantas calls time on IBM, Fujitsu in tech modernisation

Service NSW hits digital services goal two years early

Service NSW hits digital services goal two years early

NBN Co taking orders for 'non-premises' connections

NBN Co taking orders for 'non-premises' connections

Australian scientists build world's first quantum computer IC

Australian scientists build world's first quantum computer IC

Digital Nation

COVER STORY: Operationalising net zero through the power of IoT
COVER STORY: Operationalising net zero through the power of IoT
Crypto experts optimistic about future of Bitcoin: Block
Crypto experts optimistic about future of Bitcoin: Block
Integrity, ethics and board decisions in the digital age
Integrity, ethics and board decisions in the digital age
The security threat of quantum computing
The security threat of quantum computing
IBM global chief data officer on the rise of the number crunchers
IBM global chief data officer on the rise of the number crunchers
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.