Wednesday, May 6, 2026
1 p.m. ET / 10 a.m. PT
We are pleased to share that Certinet Systems is now part of Convergence Networks. Learn More.
We provide businesses like yours with IT support, proactive monitoring, and preventive maintenance.
Co-managed IT is a collaboration that works well for companies that want to keep in-house IT staff while also increasing IT capacity and specialized expertise.
We will design a customized IT helpdesk solution that meets your current business needs and scales with you as you grow.
We provide scalable, secure, and cost-effective network support that evolves with your growing business.
Providing organizations with comprehensive backup and disaster recovery solutions whether on premise or in the cloud.
Benefits from expert guidance, strategic planning and a proactive approach to IT management that drives success.
We provide cybersecurity solutions and support designed to protect your networks, assets and data while ensuring compliance with your industry regulations
We provide Zero Trust Security and Application Safeguarding to protect your environment from internal and external threats.
We provide services to assess your risk, strengthen your cybersecurity program and orient your team with solid procedures and training.
We provide the next generation of managed security services with a focus on real-time threat detection, threat hunting and active response.
We ensure your business becomes and stays compliant with all relevant regulations, safeguarding your organization’s sensitive data and reputation.
We provide ongoing services and one-time engagements to improved your cybersecurity and safeguard your critical data and assets.
Pen testing simulates a real-world cyberattack to uncover potential weaknesses before malicious actors can exploit them.
We take a holistic approach to ensuring your organization achieves and maintains compliance with Cybersecurity Maturity Model Certification (CMMC) standards.
We’ll craft customized, secure cloud solutions that meet your organization’s needs. From strategic planning to execution, our cloud migration services are designed to help your business attain smooth transitions.
We create and maintain secure, scalable and high-performing cloud environments that can be used to set yourself apart from the competition.
As a Microsoft Partner, Convergence Networks has access to exclusive training, products and tools to support our clients. We also offer tools and resources that are only available to Microsoft Partners.
We specialize in guiding businesses through cloud migrations and with leveraging Microsoft 365 benefits without technical obstacles.
We explore the specific advantages and potential challenges of adopting Microsoft Azure for your organization, help you understand how Azure fits into your overall business strategy and how it can be tailored to meet your distinct objectives.
Our team will partner with you to consolidate all your voice service needs into one place using a Microsoft Teams Phone system.
We provide the next generation of managed security services with a focus on real-time threat detection, threat hunting and active response.
Leverage the power of Microsoft 365 for modern and secure collaboration. Convergence Networks helps you unlock its full value through expert implementation, change management and tailored training programs that achieve results.
Modernize legacy applications for a faster, safer, more agile business. Our application modernization services are designed to reduce risk, accelerate business outcomes and create tools your team will want to use.
Stop wasting time on manual work. Let automation do the heavy lifting. We help you transition from manual to modern with secure, high-impact Business Process Automation (BPA) services.
Connect business-critical apps to improve security, visibility and operational control with cloud integration services. Our integration services turn disconnected apps into a secure, manageable, and unified system.
Improve connection, support employee growth and foster an inclusive culture with secure Microsoft employee engagement solutions. We help organizations support employees throughout their entire journey.
Unlock business success with our Data Analytics Services. Visualize trends and make smarter data-driven decisions. Identify trends, explore relationships in your data, and share information with your team with ease.
Transform how your team works with a secure, customized SharePoint solution built for Microsoft 365 and your business needs. Unlock the full potential of your business and 365 investment with expert SharePoint services.
We provide the next generation of managed security services with a focus on real-time threat detection, threat hunting and active response.
Our Copilot Factory delivers AI Copilots tailored to the unique needs of organizations. Discover new productivity and greater achievement.
Leverage secure AI adoption with expert-led deployment, training, policy guidance, and data protection. We help organizations adopt tools like Microsoft Copilot and other generative AI with strong data security protocols built-in.
You need an expert in your field. With over 20 years of experience in all areas of technology, we have your
We pulled together the most common business IT questions and provided some answers.
We are a security first IT services firm providing
We approach our clients with a focus on their business goals and requirements before recommending solutions to help achieve the desired outcomes. Learn more about what makes us unique.
Our core mission as a company is to help and empower people. We want to lend our time and resources to these organizations as way to give back and support all they do for our communities.
Why keep an eye on social engineering threat trends? Social engineering is the primary component of the overwhelming majority of cyberattacks today. Cyber thieves are leveraging these social engineering threat trends to directly perpetrate fraud, harvest credentials, or install malware.
Despite workers’ best efforts, cybercriminals continue to extort, defraud, and ransom companies for billions of dollars annually. As new defensive capabilities are created and put into place, crafty criminals look for new ways to defeat them.
While security-focused decision makers have prioritized strengthening defenses around physical and cloud-based infrastructure, human beings are quickly becoming the most reliable and easy entry point for compromise.
A wide array of content and techniques continue to be developed to exploit human behaviors and interests. The most effective methods prey on natural human tendencies and undermine instincts which raise an alarm that “something isn’t right.”
The intended victim is often presented with content they may already be familiar with or regularly interact with in their day-to-day jobs: receipts, documents, invoices, and spreadsheets.
The content appears routine and therefore raises no alarm. A threat actor might impersonate a trusted partner or an authority figure, such as a company’s executive.
Social interest is also frequently leveraged: at the beginning of the COVID-19 pandemic, there was a massive desire for information about updated health guidelines, company policies, regional mandates, and vaccine development.
Because of the universal relevance, threat actors of every sophistication level pivoted to make use of COVID-19 related content.
Since most office workers aren’t actively looking for phishing attempts or cybercriminal activity, it’s easy for them to make false assumptions about the nature of cyberattacks.
Here are five of the most common false assumptions:
Let’s dive into each of these false assumptions in more detail.
Effective social engineering is about generating feelings within an end user that mentally drives them into engaging with content. Something in their inbox is urgent and the other person seems trustworthy, so interacting with or helping the requester seems legitimate.
By sending innocent-appearing emails with the intent to lure the user into a false sense of security, cybercriminals lay the groundwork for a relationship to be more easily exploitable.
One particular type of threat is a Lure and Task Business Email Compromise (BEC) threat. These typically start with a benign conversation or ask a question to get the recipient to engage with the email.

Lure/task emails are typically a gateway theme – if the victim replies, they may be led to another type of threat such as a gift card, payroll, or invoice fraud.
The cybercriminal then tries to get a recipient to engage with them and will send follow-up requests – such as transferring money – in future emails once a social connection has been established. The result can cost individuals and organizations thousands of dollars.
Coworkers may be more inclined to interact with content if it appears to come from a source they trust and recognize. However, threat actors regularly abuse legitimate services such as cloud storage providers and content distribution networks to host and distribute malware, as well as credential harvesting portals.
According to Proofpoint, Google-related URLs were the most frequently abused in 2021. However, when examining which domains are actually clicked, Microsoft-related URL-based threats earned more than twice the clicks of those hosted by Google.
This could help explain why analysis shows Microsoft OneDrive is the most frequently abused service by top-tier cybercriminals, followed by Google Drive, Dropbox, Discord, Firebase, and SendGrid.
It’s not uncommon for people to think email-based threats exist only in computers. But in 2021, Proofpoint researchers found an increase in attacks perpetrated by threat actors leveraging an intricate ecosystem of call center-based email threats.
The threats require a lot of human interaction, something not regularly associated with phishing attempts. The emails themselves don’t contain malicious links or attachments, and individuals must proactively call a fake customer service number in the email to engage with the threat actor.
There are over 250,000 of these threat types each day.
There are two types of call center threat activity. One uses free, legitimate remote assistance software to steal money. The second leverages the use of malware disguised as a document to compromise a computer which can lead to additional malware.
The second attack type is frequently associated with BazaLoader malware and is often referred to as BazaCall.
Both attack types are considered telephone-oriented attack delivery (TOAD).
Here’s an example of a financially motivated TOAD threat pretending to be a PayPal invoice from a U.S. weapons manufacturer:

Victims can lose tens of thousands of dollars to these types of threats. In one case, Proofpoint identified a victim losing almost $50,000 to an attack from a threat actor masquerading as a Norton LifeLock representative.
Thread hijacking, or conversation hijacking, is a technique where cybercriminals reply to existing email conversations with a malicious attachment, URL, or request to perform some action on the cybercriminal’s behalf. The criminal using this method exploits the person’s trust in the existing email conversation.
Typically, a recipient is expecting a reply from the sender and is therefore more inclined to interact with the affected content. To successfully hijack an existing conversation, cybercriminals need to obtain access to legitimate users’ inboxes.
There are multiple ways this can be achieved, including phishing, malware attacks, credential lists available on hacking forums, or password-spraying techniques. Threat actors can also hijack entire email servers or mailboxes and automatically send replies from threat actor-controlled botnets.
Email messages will appear legitimate, and because the threat is a reply to a recognized thread, the message history will be attached.
Every year cybercriminals capitalize on current events, news, and popular culture. They use lure themes coinciding with things lots of people will be interested in to get people to engage with malicious content.
Researchers at Proofpoint observed a few BazaLoader campaigns leveraging Valentine’s Day themes such as flowers and lingerie in January 2021.

In 2021, BazaLoader cybercriminals began using infection chains that required a significant amount of human interaction, like visiting actor-controlled websites to download a payload, or even calling the threat actor directly to presumably get assistance with an erroneous purchase (as seen in the example image above).
Another key example of cybercriminals using pop culture to target users happened in October 2021. Proofpoint identified the large cybercrime actor TA575 distributing the Dridex banking trojan using Squid Game themes.
The cybercriminal entity masqueraded as an organization associated with the Netflix global phenomenon. By using emails enticing targets to get early access to a new season of Squid Game or to become a part of the TV show casting, they persuaded end users to click on malicious links or downloads.

Now that you’ve read about the latest in social engineering threat trends, here are five key insights to take away:
Cybercriminals are getting more and more creative as time goes on, willing to go the extra mile to gain access to your valuable information. Luckily, finding the right cybersecurity partner is easier than you think.
Contact us directly to discuss any cybersecurity issues you may have.
*The information and example images in this article were provided by Proofpoint, 2022.*
To connect, please enter the 6-digit code given to you by your Network Administrator: