Skip to main content

Social Engineering

Understand the techniques attackers use to manipulate people and learn how to protect yourself and your organization from these psychological attacks.

Key Practices

  • Pretexting attacks: Be skeptical of unsolicited requests for information, and verify the requestor’s identity through a trusted channel before sharing any data.
  • Vishing (voice phishing): Treat unexpected phone calls with caution; never provide sensitive information over the phone unless you initiated the call and trust the recipient.
  • Tailgating prevention: Don’t let strangers piggyback into secure areas, and challenge individuals who don’t display proper identification.
  • Information disclosure risks: Limit the amount of personal and company information you share online and offline that could be leveraged in an attack.

Social engineering preys on human psychology rather than technical vulnerabilities. Stay aware of common tactics and encourage a culture of security awareness within your organization to reduce the likelihood of successful attacks.