social engineering

What is Social Engineering?

Social engineering is a type of cyberattack that manipulates people—rather than hacking systems—to gain unauthorized access to information, money, or systems. It exploits human psychology such as trust, fear, urgency, curiosity, or authority.

In many businesses, social engineering is the most common entry point for data breaches.

What Social Engineering Looks Like

Attackers pretend to be someone trusted and try to convince employees to take an action they shouldn’t.

Common Types
  • Phishing – Fake emails or messages asking for passwords, payment, or links to “verify” accounts
  • Spear phishing – Targeted phishing aimed at specific employees (HR, finance, executives)
  • Business Email Compromise (BEC) – Impersonating a CEO/vendor to request urgent wire transfers or gift cards
  • Vishing – Phone calls posing as IT, banks, or executives
  • Smishing – Phishing via text message
  • Pretexting – Creating a believable story to obtain information (e.g., “I’m a new vendor” or “I’m from IT”)
  • Tailgating – Physically following employees into secure areas
Why Social Engineering Works
  • People want to be helpful
  • Employees may fear authority or urgency
  • Attackers gather personal and company info from LinkedIn, websites, or social media
  • Technical defenses can’t always stop human mistakes
How to Prevent Social Engineering in a Business Environment
1. Employee Awareness & Training (Most Important)
  • Regular security awareness training
  • Teach employees to:
    • Verify requests for money or sensitive data
    • Be skeptical of urgency or pressure
    • Spot red flags (misspellings, odd sender addresses, unusual requests)
  • Run phishing simulations to reinforce learning
2. Strong Verification Procedures
  • Require out-of-band verification (call-back, secondary approval) for:
    • Wire transfers
    • Vendor payment changes
    • Password resets
  • Never rely on email alone for financial or credential requests
3. Limit Access (Least Privilege)
  • Employees only get access necessary for their role
  • Separate duties (e.g., one person requests payment, another approves it)
  • Restrict admin privileges
4. Technical Controls
  • Multi-Factor Authentication (MFA) on all critical systems
  • Email filtering and anti-phishing tools
  • Disable macros by default
  • Use strong password policies and password managers
5. Clear Policies & Culture
  • Document security policies clearly
  • Encourage employees to:
    • Question unusual requests—even from executives
    • Report suspicious emails without fear of punishment
  • Make security part of company culture, not just IT’s job
6. Physical Security Measures
  • Badge access and visitor sign-in
  • No “tailgating” policies
  • Shred sensitive documents
7. Incident Response Plan
  • Clear steps for reporting suspected social engineering
  • Quick containment and investigation procedures
  • Regular review and improvement after incidents
Red Flags Employees Should Watch For
  • Urgent or secret requests
  • Requests to bypass normal procedures
  • Unusual payment methods (gift cards, crypto)
  • Sender addresses that look “almost right”
  • Requests for login credentials—legitimate IT will never ask for passwords
In Simple Terms

Social engineering succeeds when attackers trick people into opening the door for them.
Training, verification, and a questioning culture are the strongest locks.

For a Cyber Liability quote for your business please contact your Professional Underwriters, Inc. agent or contact our office here. https://www.profunderwriters.com/free-online-quote-form/

Previous Post
Is a surplus lines professional liability policy a bad idea?