Social Engineering

What is it and how can we defend against them

In cybersecuritysocial engineering refers to the use of psychological manipulation to trick people into revealing confidential information or performing actions that compromise security. Instead of hacking into systems through technical means, attackers exploit human behavior—such as trust, fear, urgency, or curiosity.

Here's how it works:

Social engineering attacks often follow a pattern:

  1. Research: The attacker gathers information about the target (e.g., job role, contacts, habits).
  2. Engagement: They initiate contact—via email, phone, social media, or in person.
  3. Manipulation: They use persuasive tactics to gain trust or create a sense of urgency.
  4. Exploitation: The victim is tricked into giving up sensitive data, clicking a malicious link, or granting access.

Common Types of Social Engineering Attacks

TypeDescriptionExample
PhishingMass emails that appear legitimateFake bank alert asking for login details
Spear PhishingTargeted phishing aimed at a specific personEmail pretending to be from a colleague
WhalingPhishing aimed at executivesCEO receives fake invoice request
PretextingAttacker creates a fabricated scenarioPretending to be IT support to get passwords
BaitingLuring victims with something temptingUSB drive labeled “Confidential” left in office
TailgatingGaining physical access by following someone into a secure areaPretending to be a delivery person

How to Defend Against Social Engineering

  • Security Awareness Training: Teach employees how to recognize and respond to suspicious behavior.
  • Verify Requests: Always confirm sensitive requests through a second channel.
  • Limit Information Sharing: Be cautious about what is shared publicly or on social media.
  • Use Multi-Factor Authentication (MFA): Adds a layer of protection even if credentials are compromised.
  • Report Incidents: Encourage a culture of reporting suspicious activity.

Social engineering is effective because it targets the human element, often considered the weakest link in cybersecurity.