{"id":50809,"date":"2024-12-26T03:51:42","date_gmt":"2024-12-26T10:51:42","guid":{"rendered":"https:\/\/www.syteca.com\/?post_type=glossary&#038;p=50809"},"modified":"2024-12-26T04:47:01","modified_gmt":"2024-12-26T11:47:01","slug":"what-is-social-engineering","status":"publish","type":"glossary","link":"https:\/\/www.syteca.com\/en\/glossary\/what-is-social-engineering","title":{"rendered":"What Is Social Engineering?"},"content":{"rendered":"\n<p>Protecting your organization against social engineering attacks has become more crucial than ever. Modern social engineering attacks exploit sophisticated methods to trick individuals into revealing sensitive information, all without setting off traditional security alarms. Understanding social engineering attacks and adopting best practices to prevent them is essential for organizations that prioritize data protection, resilience, and customer loyalty.<\/p>\n\n\n\n<p>In this article, we&#8217;ll explore the mechanisms behind social engineering, outline specific types of attacks, discuss the dangers they pose, and provide actionable insights on protecting your organization against them.<\/p>\n\n\n\n<h2  class=\"wp-block-heading\">What is social engineering?<\/h2>\n\n\n\n<p>Social engineering is a form of cyber attack that relies on psychological manipulation to gain access to sensitive information or systems. It involves deceiving individuals into revealing confidential data.&nbsp;<\/p>\n\n\n\n<p>A social engineering attack is <em>&#8220;an attempt to trick someone into revealing information (e.g., a password) that can be used to attack systems or networks.<\/em>&#8221; \u2014 <a href=\"https:\/\/doi.org\/10.6028\/NIST.SP.800-61r2\" target=\"_blank\" rel=\"noreferrer noopener\">NIST SP 800-61 Rev. 2<\/a>&nbsp;&nbsp;<\/p>\n\n\n\n<p>Malicious actors use social engineering because it&#8217;s often easier and more effective than attempting to compromise security systems using technical tactics. By exploiting human emotions and carelessness, attackers can obtain the data they need without much effort. Their goal is typically to extract information to facilitate further malicious activities within your organization&#8217;s systems.<\/p>\n\n\n\n<h2  class=\"wp-block-heading\">How social engineering works<\/h2>\n\n\n\n<p>Cybercriminals use various social engineering tactics to manipulate human trust and curiosity, often by assuming false identities or inventing believable stories. As technologies develop, cybercriminals get craftier by sending personalized phishing messages generated by AI or voice\/video deepfakes of executives.<\/p>\n\n\n\n<p>The list of techniques constantly grows. Here&#8217;s a look at the most common social engineering examples you should be aware of:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"825\" height=\"279\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/12\/26033703\/1-What-Is-Social-Engineering.svg\" alt=\"Common types of social engineering attacks\" class=\"wp-image-50810\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Phishing<\/h3>\n\n\n\n<p>Phishing is a classic social engineering tactic where attackers send fraudulent emails or messages that mimic legitimate sources. The goal is to trick recipients into disclosing sensitive information or clicking on harmful links. For example, an attacker might pretend to be a tech support member from a popular e-commerce platform like Amazon, sending an email that alerts you about a &#8220;suspicious login attempt&#8221; and asking you to &#8220;verify&#8221; your account by clicking a link. Phishing attacks can fall into two categories:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Bulk phishing. <\/strong>This type of phishing involves sending mass emails to a large number of recipients, often with generic content.<\/li>\n\n\n\n<li><strong>Spear phishing<\/strong>. Unlike bulk phishing, spear phishing targets specific individuals or groups within an organization. These emails are customized and more convincing.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Vishing<\/h3>\n\n\n\n<p>Known as \u201cvoice phishing,\u201d the vishing technique leverages phone calls to manipulate victims into sharing confidential details. Scammers often pose as trusted entities like banks, tech support, or company personnel and create a sense of urgency to extract information quickly.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Baiting<\/h3>\n\n\n\n<p>Baiting involves luring victims into a trap by offering something enticing to trick them into sharing private information. For instance, attackers may post links that offer free concert tickets or free downloads for popular software, movies, or games. Those links direct users to malicious websites that prompt people to enter personal details or download harmful software.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Pretexting<\/h3>\n\n\n\n<p>In this technique, an attacker fabricates a believable story or &#8220;pretext&#8221; to manipulate a target into revealing sensitive information or performing specific actions. For instance, a scammer might impersonate a member of your IT staff and request login details under the guise of &#8220;resolving an issue.&#8221; Unlike phishing, which tries to invoke some sense of urgency or fear, pretexting relies heavily on crafting a convincing story to manipulate the target into compliance.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Business email compromise (BEC)&nbsp;<\/h3>\n\n\n\n<p>BEC attacks are carefully targeted and especially damaging financially. Attackers impersonate executives or finance team members to trick employees into transferring funds or disclosing sensitive information.<\/p>\n\n\n\n<p><a href=\"\/en\/glossary\/ceo-fraud\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>CEO fraud<\/strong><\/a> is a subtype of BEC in which cybercriminals pretend to be top executives, often in urgent emails, and pressure employees to approve unauthorized transactions or share confidential data.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Deepfake scams<\/h3>\n\n\n\n<p><br>Using advanced AI, cybercriminals can create realistic fake audio or video recordings that appear to be from trusted individuals. Deepfake technology allows attackers to convincingly impersonate CEOs, managers, or other authorities and make requests that seem authentic.<\/p>\n\n\n\n<p>These are the most common types of social engineering attacks, but new variations are constantly emerging. The most troubling part is that each of them can harm your organization in different ways.<\/p>\n\n\n\n<h2  class=\"wp-block-heading\">Why is social engineering dangerous for organizations?<\/h2>\n\n\n\n<p>Social engineering attacks are particularly dangerous because they exploit the weakest link in any security system: the <a href=\"\/en\/blog\/how-prevent-human-error-top-5-employee-cyber-security-mistakes\" target=\"_blank\" rel=\"noreferrer noopener\">human element<\/a>. Unlike hacking, social engineering bypasses traditional security controls by directly manipulating people, making it harder to detect.<\/p>\n\n\n\n<p>Social engineering attacks can have a range of severe consequences for organizations, including:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"825\" height=\"310\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/12\/26033733\/2-What-Is-Social-Engineering.svg\" alt=\"Negative consequences of social engineering attacks\" class=\"wp-image-50817\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Financial losses<\/h3>\n\n\n\n<p>Social engineering attacks, especially BEC and CEO fraud, often lead to direct financial losses. Attackers can trick employees into making unauthorized payments, transferring funds, or exposing valuable assets, which can amount to millions in damages for large organizations. Recovering from any social engineering attack also often involves costly forensic investigations and IT security overhauls.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Data privacy violations<\/h3>\n\n\n\n<p>When attackers obtain access to sensitive data, they gain the ability to expose confidential information about customers, employees, or business operations, which can lead to lawsuits. Regulatory bodies impose significant fines and penalties for failing to adequately protect sensitive data under regulations, standards, and laws like the <a href=\"\/en\/solutions\/meeting-compliance-requirements\/gdpr-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">GDPR<\/a> and <a href=\"\/en\/solutions\/meeting-compliance-requirements\/hipaa-compliance-solutions\" target=\"_blank\" rel=\"noreferrer noopener\">HIPAA<\/a>.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Loss of intellectual property<\/h3>\n\n\n\n<p>Cybercriminals can use social engineering to steal your intellectual property, trade secrets, or strategic business plans. If this information is sold or leaked, it can result in a loss of competitive advantage for your organization.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Reputational damage<\/h3>\n\n\n\n<p>News about a successful social engineering attack can damage your organization&#8217;s reputation, especially if customer data or proprietary information is compromised. Losing customer trust can affect your client retention, market value, and future business opportunities.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Operational disruptions<\/h3>\n\n\n\n<p>Social engineering attacks can interrupt day-to-day operations, especially if malware, such as ransomware, is deployed and exploited. This can bring a halt to your critical systems, delay projects, and decrease productivity until the threat is resolved.<\/p>\n\n\n\n<p>Considering the above, effective social engineering prevention measures can save you money, reputation, and a competitive edge.&nbsp;<\/p>\n\n\n\n<h2  class=\"wp-block-heading\">How to protect your organization from social engineering attacks<\/h2>\n\n\n\n<p>Protecting an organization from social engineering attacks involves a mix of employee training, security protocols, and technology solutions. Here are some of the most effective practices that can help you prevent social engineering attacks and enhance your overall security:<\/p>\n\n\n\n\t\t<div  class=\"block-2bf6c03b-14a8-47b9-8176-306d8baafb2d areoi-element container template-15 mx-0\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center text-26-22 p-poppins\" style=\"font-style:normal;font-weight:600\">Best practices to protect your organization against social engineering attacks<\/p>\n\n\n\n\t\t<div  class=\"block-09ce9014-f15a-435c-867c-4fcb978322f4 row areoi-element pt-3 row-cols-1\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-00293862-de68-4439-86cc-012eaa67310c col areoi-element p-4 mb-4 d-flex align-items-center rounded-13 rounded-bg-13px\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"p-3 mb-0 rounded-13 has-text-color has-background\" style=\"color:#fefdfd;background-color:#4790ea;font-size:2.5rem\">1<\/p>\n\n\n\n<p class=\"p-poppins mb-0 ps-4\" style=\"font-size:1.25rem;font-style:normal;font-weight:600\">Raise employee awareness<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-94d314aa-cecc-4a64-bb45-3b08a63d9419 col areoi-element p-4 mb-4 d-flex align-items-center rounded-13 rounded-bg-13px\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"p-3 mb-0 rounded-13 has-text-color has-background\" style=\"color:#fefdfd;background-color:#4790ea;font-size:2.5rem\">2<\/p>\n\n\n\n<p class=\"p-poppins mb-0 ps-4\" style=\"font-size:1.25rem;font-style:normal;font-weight:600\">Limit access to sensitive data<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-00293862-de68-4439-86cc-012eaa67310c col areoi-element p-4 mb-4 d-flex align-items-center rounded-13 rounded-bg-13px\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"p-3 mb-0 rounded-13 has-text-color has-background\" style=\"color:#fefdfd;background-color:#4790ea;font-size:2.5rem\">3<\/p>\n\n\n\n<p class=\"p-poppins mb-0 ps-4\" style=\"font-size:1.25rem;font-style:normal;font-weight:600\">Establish strong password policies<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-94d314aa-cecc-4a64-bb45-3b08a63d9419 col areoi-element p-4 mb-4 d-flex align-items-center rounded-13 rounded-bg-13px\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"p-3 mb-0 rounded-13 has-text-color has-background\" style=\"color:#fefdfd;background-color:#4790ea;font-size:2.5rem\">4<\/p>\n\n\n\n<p class=\"p-poppins mb-0 ps-4\" style=\"font-size:1.25rem;font-style:normal;font-weight:600\">Use email filtering tools<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-00293862-de68-4439-86cc-012eaa67310c col areoi-element p-4 mb-4 d-flex align-items-center rounded-13 rounded-bg-13px\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"p-3 mb-0 rounded-13 has-text-color has-background\" style=\"color:#fefdfd;background-color:#4790ea;font-size:2.5rem\">5<\/p>\n\n\n\n<p class=\"p-poppins mb-0 ps-4\" style=\"font-size:1.25rem;font-style:normal;font-weight:600\">Develop a clear incident response plan<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<h3 class=\"wp-block-heading\">1. Raise employee awareness<\/h3>\n\n\n\n<p>Conduct regular cybersecurity training sessions to <a href=\"\/en\/blog\/insider-threat-awareness\" target=\"_blank\" rel=\"noreferrer noopener\">raise employee awareness<\/a> of social engineering tactics. Encourage employees to report any suspicious emails and interactions, even if they&#8217;re unsure whether they pose threats. It&#8217;s also a good practice to send mock phishing emails to test your employees&#8217; ability to recognize social engineering attacks.\u00a0<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Limit access to sensitive data<\/h3>\n\n\n\n<p>Limiting access to sensitive data and assigning access rights based on employee roles and responsibilities can significantly reduce the impact of social engineering attacks. By enforcing the <a href=\"\/en\/blog\/the-principle-of-least-privilege\" target=\"_blank\" rel=\"noreferrer noopener\">principle of least privilege<\/a>, organizations can minimize the potential damage if an attacker does succeed in fooling an employee. You may also choose to implement <a href=\"\/en\/product\/user-activity-monitoring\" target=\"_blank\" rel=\"noreferrer noopener\">user activity monitoring software<\/a> to track users\u2019 access to and handling of sensitive data. Regularly perform <a href=\"\/en\/blog\/user-access-review\" target=\"_blank\" rel=\"noreferrer noopener\">user access reviews<\/a> to make sure there is no privilege creep.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Establish strong password policies<\/h3>\n\n\n\n<p>Implement policies for <a href=\"\/en\/blog\/password-management-best-practices\" target=\"_blank\" rel=\"noreferrer noopener\">strong password management<\/a> and protection. These policies should necessarily include regular password updates to limit the window of exposure in the event that an employee\u2019s credentials are compromised. You can also deploy automated <a href=\"\/en\/product\/workforce-password-management\" target=\"_blank\" rel=\"noreferrer noopener\">workforce password management tools<\/a> to secure employee credentials. &nbsp;And to add a layer of protection that goes beyond password reliance, consider requiring <a href=\"\/en\/two-factor-authentication-tool\" target=\"_blank\" rel=\"noreferrer noopener\">multi-factor authentication<\/a> for all accounts within your IT environment.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Use email filtering tools<\/h3>\n\n\n\n<p>Deploy anti-phishing filters that detect and block phishing emails before they reach your employees. You can also use URL filtering to restrict access to malicious links, thus reducing the likelihood of malware or ransomware spreading within your network.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. Develop a clear incident response plan<\/h3>\n\n\n\n<p>Define key steps and procedures that must be followed if a social engineering attack occurs. Your <a href=\"\/en\/blog\/incident-response-plan-tips\" target=\"_blank\" rel=\"noreferrer noopener\">incident response plan<\/a> should include containment, mitigation, and reporting measures. We also recommend conducting routine drills to simulate social engineering incidents and practice the execution of response protocols to improve real-time readiness.<\/p>\n\n\n\n<p>These practices, combined with deploying a comprehensive cybersecurity platform like <a href=\"\/en\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Syteca<\/strong><\/a><strong>,<\/strong> can help you detect, resist, and respond to potential social engineering attacks. Offering robust <a href=\"\/en\/product\/privileged-access-management\" target=\"_blank\" rel=\"noreferrer noopener\">access management<\/a> and <a href=\"\/en\/product\/user-activity-monitoring\" target=\"_blank\" rel=\"noreferrer noopener\">user activity monitoring<\/a>, Syteca gives you all the tools necessary to stay one step ahead of cybercriminals attempting to exploit human vulnerabilities.<\/p>\n\n\n\n\t\t<div  class=\"block-39e8b7cd-7258-481b-9a8b-45c0301cac9a areoi-element container pattern-request-demo-2 rounded-bg-13px\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(71, 144, 235,0.15)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-e5a8fe4e-e55e-4e60-aaa8-ab457ec6aa72 row areoi-element align-items-center row-cols-md-2\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-9e962fe6-f77f-40f9-898c-abaef3f48ccb col areoi-element d-flex flex-wrap flex-column align-items-center align-items-md-start col-md-6\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-left p-poppins pt-3 text-center text-md-start lh-sm has-text-color\" style=\"color:#1a3b4e;font-size:1.75rem;font-style:normal;font-weight:600\">Want to try Syteca? Request access<br>to the online demo!<\/p>\n\n\n\n<p class=\"has-text-align-left p-poppins pb-3 text-center text-md-start\" style=\"font-style:normal;font-weight:500\">See why clients from 70+ countries already use Syteca.<\/p>\n\n\n\n\t\t\t\t\n\t\t<button data-bs-target=\"#hsModal-demo\" data-bs-toggle=\"modal\" \n\t\t\t\n\t\t\tclass=\"block-9170fdac-8fec-4c73-a86c-338093dbf9d9 btn areoi-has-url position-relative me-lg-2  me-md-2 me-sm-2 me-lg-4 mb-3 hsBtn-demo btn-info  btn-info\"\n\t >\n\t\t\t\t\t\n\t\t\t\t\tAccess the Demo Portal \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/button>\n\t\t\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-f840f051-f300-4ade-9e70-68d6c65e619d col areoi-element col-md-6 d-none d-sm-none d-md-block\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"369\" height=\"248\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/06\/02014220\/Group-584.png\" alt=\"\" class=\"wp-image-24868\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/06\/02014220\/Group-584.png 369w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/06\/02014220\/Group-584-300x202.png 300w\" sizes=\"(max-width: 369px) 100vw, 369px\" \/><\/figure>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t","protected":false},"featured_media":50824,"menu_order":0,"template":"","class_list":["post-50809","glossary","type-glossary","status-publish","has-post-thumbnail","hentry","glossary_category-data-protection"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What Is Social Engineering? | Syteca<\/title>\n<meta name=\"description\" content=\"Learn what social engineering is, its attack techniques and examples, plus the most effective cybersecurity practices to prevent these threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.syteca.com\/en\/glossary\/what-is-social-engineering\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is Social Engineering? | Syteca\" \/>\n<meta property=\"og:description\" content=\"Learn what social engineering is, its attack techniques and examples, plus the most effective cybersecurity practices to prevent these threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.syteca.com\/en\/glossary\/what-is-social-engineering\" \/>\n<meta property=\"og:site_name\" content=\"Syteca\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-26T11:47:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/12\/26034736\/OG-What-Is-Social-Engineering.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/12\/26034747\/OG-TW-What-Is-Social-Engineering.png\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.syteca.com\/en\/glossary\/what-is-social-engineering\",\"url\":\"https:\/\/www.syteca.com\/en\/glossary\/what-is-social-engineering\",\"name\":\"What Is Social Engineering? | Syteca\",\"isPartOf\":{\"@id\":\"https:\/\/www.syteca.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.syteca.com\/en\/glossary\/what-is-social-engineering#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.syteca.com\/en\/glossary\/what-is-social-engineering#primaryimage\"},\"thumbnailUrl\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/12\/26034631\/banner-What-Is-Social-Engineering.png\",\"datePublished\":\"2024-12-26T10:51:42+00:00\",\"dateModified\":\"2024-12-26T11:47:01+00:00\",\"description\":\"Learn what social engineering is, its attack techniques and examples, plus the most effective cybersecurity practices to prevent these threats.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.syteca.com\/en\/glossary\/what-is-social-engineering#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.syteca.com\/en\/glossary\/what-is-social-engineering\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.syteca.com\/en\/glossary\/what-is-social-engineering#primaryimage\",\"url\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/12\/26034631\/banner-What-Is-Social-Engineering.png\",\"contentUrl\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/12\/26034631\/banner-What-Is-Social-Engineering.png\",\"width\":1920,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.syteca.com\/en\/glossary\/what-is-social-engineering#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Glossary\",\"item\":\"https:\/\/www.syteca.com\/en\/glossary\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data protection\",\"item\":\"https:\/\/www.syteca.com\/en\/glossary-category\/data-protection\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What Is Social Engineering?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.syteca.com\/en\/#website\",\"url\":\"https:\/\/www.syteca.com\/en\/\",\"name\":\"Syteca\",\"description\":\"Syteca | software to monitor privileged users and audit employee activity, detect insider threats, and protect servers in real time. Try a free demo now!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.syteca.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Is Social Engineering? | Syteca","description":"Learn what social engineering is, its attack techniques and examples, plus the most effective cybersecurity practices to prevent these threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.syteca.com\/en\/glossary\/what-is-social-engineering","og_locale":"en_US","og_type":"article","og_title":"What Is Social Engineering? | Syteca","og_description":"Learn what social engineering is, its attack techniques and examples, plus the most effective cybersecurity practices to prevent these threats.","og_url":"https:\/\/www.syteca.com\/en\/glossary\/what-is-social-engineering","og_site_name":"Syteca","article_modified_time":"2024-12-26T11:47:01+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/12\/26034736\/OG-What-Is-Social-Engineering.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_image":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/12\/26034747\/OG-TW-What-Is-Social-Engineering.png","twitter_misc":{"Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.syteca.com\/en\/glossary\/what-is-social-engineering","url":"https:\/\/www.syteca.com\/en\/glossary\/what-is-social-engineering","name":"What Is Social Engineering? | Syteca","isPartOf":{"@id":"https:\/\/www.syteca.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.syteca.com\/en\/glossary\/what-is-social-engineering#primaryimage"},"image":{"@id":"https:\/\/www.syteca.com\/en\/glossary\/what-is-social-engineering#primaryimage"},"thumbnailUrl":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/12\/26034631\/banner-What-Is-Social-Engineering.png","datePublished":"2024-12-26T10:51:42+00:00","dateModified":"2024-12-26T11:47:01+00:00","description":"Learn what social engineering is, its attack techniques and examples, plus the most effective cybersecurity practices to prevent these threats.","breadcrumb":{"@id":"https:\/\/www.syteca.com\/en\/glossary\/what-is-social-engineering#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.syteca.com\/en\/glossary\/what-is-social-engineering"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.syteca.com\/en\/glossary\/what-is-social-engineering#primaryimage","url":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/12\/26034631\/banner-What-Is-Social-Engineering.png","contentUrl":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/12\/26034631\/banner-What-Is-Social-Engineering.png","width":1920,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/www.syteca.com\/en\/glossary\/what-is-social-engineering#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Glossary","item":"https:\/\/www.syteca.com\/en\/glossary"},{"@type":"ListItem","position":2,"name":"Data protection","item":"https:\/\/www.syteca.com\/en\/glossary-category\/data-protection"},{"@type":"ListItem","position":3,"name":"What Is Social Engineering?"}]},{"@type":"WebSite","@id":"https:\/\/www.syteca.com\/en\/#website","url":"https:\/\/www.syteca.com\/en\/","name":"Syteca","description":"Syteca | software to monitor privileged users and audit employee activity, detect insider threats, and protect servers in real time. Try a free demo now!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.syteca.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/glossary\/50809","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/glossary"}],"about":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/types\/glossary"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/media\/50824"}],"wp:attachment":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/media?parent=50809"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}