Security awareness

Protecting Against Social Engineering Attacks

Howard Poston
March 19, 2019 by
Howard Poston

Most people think of hacking as using malware and coding to bypass security defenses and steal data or money. Social engineers take a different approach, targeting the human instead of the software to achieve their goals.

How Social Engineering Works

Social engineers take advantage of knowledge of human behavior to perform their attacks. A person’s biases, assumptions, beliefs and more can allow an attacker to trick them into doing something that is in the attacker’s interests. The field of social engineering is based on psychology and acting.

Role-appropriate training to your entire workforce

Role-appropriate training to your entire workforce

Get a free year of cybersecurity skills training with your security awareness training purchase.  

Research by Robert B. Cialdini found that humans are more likely to comply with a request under certain circumstances:

  1. The request is made by an authority figure
  2. The person making the request is likable or has similar interests, beliefs and attitudes as the victim
  3. The person making the request gives or promises the target something of value in return for their help
  4. If the requestor is asking on behalf of a cause that the victim has publicly endorsed
  5. If complying with the request appears to be in line with what others are doing
  6. When the requestor is offering something in short supply or available for a limited time

Social engineers are aware of these human biases and take advantage of them in a variety of ways. Social engineering attacks commonly involve:

  • Pretexting: Masquerading as someone else
  • Baiting: Enticing the victim with promises of something of value
  • Blacmail: Threatening to reveal something that the target wishes to be kept secret
  • Quid Pro Quo: Promising something to the victim in exchange for their help

Social engineers use their knowledge of how people think in a variety of ways. By targeting the human element, they increase their probability of a successful attack by bypassing defenses designed to protect against “conventional” hacking.

Types of Social Engineering Attacks

Social engineering attacks can be performed through any medium. Social engineers can use the Internet, a phone call or an in-person visit to bypass an organization’s network defenses. In this section, we’ll briefly describe some of the most common types of social engineering attacks.

Web-Based Attacks

The Internet makes cyberattacks possible on a global scale. There are a variety of specific Web-based social engineering attacks, but phishing and watering hole attacks are some of the most common.

Phishing and SMiShing

Phishing is the most common type of social engineering. In fact, 91% of successful attacks begin as a phishing email. The term phishing covers a lot of ground and refers to the use of digital communications to get the target to do something that benefits a hacker. In general, this means getting the end user to click on a malicious link or download and open an attachment. The details of phishing are constantly changing as network defenders develop methods to identify and block phishing emails and hackers create new ways to evade those protections.

There are names for many different phishing attacks based on the medium used or the target. When text messages are used for phishing, it’s called SMiShing, and phishing over the phone is vishing. In a spearphishing attack, a particular user is targeted rather than a large pool of recipients. Business Email Compromise (BEC) attacks impersonate high-level executives within an organization, while whaling attacks target them.

Watering Hole

In a watering hole attack, hackers take advantage of people’s habits to attack them. When preparing to attack a particular target, the attacker observes their browsing habits to identify the type of sites that they routinely visit. For example, when targeting developers, they might target StackOverflow or a similar site. The attacker then compromises the target site and forces it to serve malicious content to users or creates a malicious site that the user is likely to visit. Eventually, the user visits the site and is compromised.

Phone-Based Attacks

Phone-based social engineering attacks are based on impersonating someone that the target would want to (or feel that they have to) talk to. When targeting people outside of work hours, impersonating the government (especially the IRS) and banks are common choices.

One specific type of phone-based social engineering is the help desk scam. In this scheme, the attacker pretends to be a member of the IT help desk at the target’s organization. This pretext gives the attacker the ability to tell the user to take certain actions on their computer without raising their suspicions. A reverse help desk scam is a variant where the attacker gets the target to call them, adding another layer of authenticity to their impersonation of the help desk.

In-Person Attacks

While the Internet and phone system make it possible to perform cyberattacks from anywhere, sometimes in-person attacks are the most effective. Physical access to devices is extremely useful for an attacker, and people are much more likely to reveal sensitive information to someone in person than over the phone or by email.

Tailgating and Piggybacking

Physical access to a company’s offices can provide an attacker with a wealth of valuable data. Information that is extremely useful for crafting a spearphishing attack is pinned to bulletin boards or left on desks within the organization’s office. Finding an unlocked computer could allow an attacker to steal sensitive data in a way undetectable by the organization’s perimeter-focused defenses.

In order to take advantage of these opportunities, the attacker needs to be able to get through the front door. Piggybacking and tailgating are both terms for the most common way of accomplishing this. In general, most people are nice and want to help others, especially someone carrying a heavy package, running late for an important meeting or otherwise struggling or in a hurry. Holding a door doesn’t seem like a big deal, but it’s all that a social engineer needs to get into the building.

Pretexting and NLP

All social engineering attacks involve pretexting, but this is especially true for in-person attacks. “Clothes make the man,” and social engineers know that dressing, talking and acting the right way can do wonders for getting sensitive information out of unsuspecting targets. Neuro-linguistic programming (NLP) is the study of this fact and has found that people are much more likely to help someone with the same accent, body language, vocabulary and other such characteristics.

Protecting Yourself Against Social Engineering

Social engineers take advantage of how people think to perform attacks. Many of these biases and behaviors occur on the subconscious level, making it difficult to identify and protect against social engineering attacks.

However, social engineering boils down to someone attempting to do something that they are not authorized to do. In “The Art of Deception,” well-known social engineer Kevin Mitnick suggests the following three-step process to verify a request:

  1. Verify that the person is who they claim
  2. Verify that the person is a current employee or has need-to-know relationship with the company
  3. Verify that the person is authorized to make request

If you can verify that all three of these things are true, you’re probably not dealing with a social engineer. Taking a moment to slow down and follow appropriate processes is the best way to protect yourself against social engineers.

The Bottom Line on Social Engineering

Social engineering is based on the attacker taking advantage of human behavior to get something out of their target. It can be performed over any medium and comes in a variety of forms. However, taking the time to analyze the situation and verify requests before acting can allow anyone to detect and defeat a social engineering attack.

See Infosec IQ in action

See Infosec IQ in action

From gamified security awareness to award-winning training, phishing simulations, culture assessments and more, we want to show you what makes Infosec IQ an industry leader.



  1. The Science of Persuasion, Scientific American
  2. 91% of Cyber Attacks Start With a Phishing Email: Here's How to Protect Against Phishing, Digital Guardian
  3. Mitnick, Kevin. “The Art of Deception: Controlling the Human Element of Security,” Wiley, 2003
Howard Poston
Howard Poston

Howard Poston is a copywriter, author, and course developer with experience in cybersecurity and blockchain security, cryptography, and malware analysis. He has an MS in Cyber Operations, a decade of experience in cybersecurity, and over five years of experience as a freelance consultant providing training and content creation for cyber and blockchain security. He is also the creator of over a dozen cybersecurity courses, has authored two books, and has spoken at numerous cybersecurity conferences. He can be reached by email at or via his website at