Home Blog Cybersecurity
Cybersecurity

What is Social Engineering? The Human Side of Hacking

What is Social Engineering? The Human Side of Hacking

What Is Social Engineering?

Social engineering is the art of manipulating people into performing actions or divulging confidential information. Unlike traditional hacking, which targets software and hardware vulnerabilities, social engineering targets the one vulnerability that cannot be patched: human nature.

Attackers who use social engineering exploit fundamental psychological traits -- our desire to be helpful, our tendency to trust authority figures, our fear of negative consequences, and our natural curiosity. These attacks are often more effective than technical exploits because they bypass every firewall, antivirus program, and encryption protocol by going directly to the person behind the keyboard.

Why Social Engineering Works

Social engineering succeeds because of deeply ingrained human behaviors:

  • Authority compliance -- People tend to follow instructions from perceived authority figures without questioning them. An email that appears to come from a CEO or government agency carries inherent weight.
  • Reciprocity -- When someone does something for us, we feel obligated to return the favor. Attackers exploit this by offering something first -- a free tool, useful information, or a favor -- before making their request.
  • Urgency and fear -- Time pressure short-circuits critical thinking. Messages that create panic ("Your account has been compromised!") push people to act before they think.
  • Social proof -- We look to others to determine correct behavior. Attackers leverage this by implying that an action is normal or that others have already complied.
  • Liking and trust -- We are more likely to comply with requests from people we like or who seem similar to us. Attackers build rapport before making their move.

Types of Social Engineering Attacks

Phishing

The most widespread form of social engineering, phishing uses emails, text messages, or fake websites to trick victims into revealing credentials or downloading malware. While phishing is often automated, sophisticated campaigns are carefully crafted to target specific organizations or individuals. For a detailed breakdown, see our guide on recognizing phishing links.

Pretexting

Pretexting involves creating a fabricated scenario (the "pretext") to engage the victim and gain their trust. The attacker assumes a false identity -- an IT support technician, a bank representative, a vendor, or even a coworker -- and builds a plausible story to justify their request for information.

For example, an attacker might call a company's reception desk claiming to be from the IT department: "We are migrating to a new email system and need to verify your credentials to transfer your mailbox." The story is believable, the request seems reasonable, and the victim complies.

Baiting

Baiting lures victims with something enticing. This can be physical -- like a USB drive labeled "Salary Information Q4" left in a parking lot -- or digital, such as a free software download that contains malware. The bait appeals to curiosity or greed, and the victim's desire to see what is on the drive or use the free tool overrides their caution.

Tailgating (Piggybacking)

Tailgating is a physical social engineering technique where an attacker follows an authorized person through a secured door or entrance. This might be as simple as carrying a stack of boxes and asking someone to hold the door, or wearing a uniform that suggests they belong. Once inside, the attacker has physical access to computers, networks, and sensitive areas.

Quid Pro Quo

In a quid pro quo attack, the attacker offers a service or benefit in exchange for information. A classic example is an attacker calling employees at random, posing as IT support, offering to help solve a technical problem. During the "support session," they ask the victim to install software (which is actually malware) or provide their login credentials to "test the fix."

Vishing (Voice Phishing)

Vishing uses phone calls to extract information. Attackers may spoof caller ID to appear to be calling from a legitimate organization. They often combine urgency with authority: "This is the fraud department at your bank. We have detected suspicious activity on your account. We need to verify your identity by confirming your account number and PIN."

How Businesses Get Targeted

Social engineering attacks against businesses can be devastating. Here are common scenarios:

Business Email Compromise (BEC) -- An attacker compromises or impersonates a senior executive's email account and sends instructions to the finance department to wire money to a specific account. These attacks have cost businesses billions of dollars globally. Read more in our article on email scams in 2026.

Vendor Impersonation -- An attacker poses as a trusted vendor and sends an invoice with updated banking details. The company pays the invoice, but the money goes to the attacker's account. Without verification procedures, this attack is remarkably effective.

New Employee Targeting -- New employees who do not yet know all their colleagues are prime targets. An attacker can impersonate a manager or IT administrator, and the new employee has no way to verify whether the request is legitimate.

Help Desk Manipulation -- Attackers call the help desk pretending to be a locked-out employee, using publicly available information to pass identity verification. They convince the help desk to reset a password or grant access to an account.

How to Defend Against Social Engineering

For Individuals

  • Verify before trusting. If you receive an unexpected request for information or action, verify it through a separate channel. Call the person back using a number you know is legitimate, not the one they provided.
  • Be skeptical of urgency. Legitimate requests rarely require immediate action. If someone pressures you to act right now, slow down and think critically.
  • Guard your personal information. Be mindful of what you share on social media. Attackers use personal details to make their pretexts more convincing.
  • Question authority. Just because someone claims to be from IT, management, or a government agency does not mean they are. Verify their identity before complying.
  • Trust your instincts. If something feels wrong, it probably is. It is better to be cautious and verify than to comply and regret it.

For Organizations

  • Security awareness training -- Regular training that includes simulated social engineering attacks helps employees recognize and resist manipulation. Training should be ongoing, not a one-time event.
  • Clear verification procedures -- Establish protocols for verifying identity before releasing information, processing payments, or granting access. This should include out-of-band verification for sensitive requests.
  • Principle of least privilege -- Limit access to information and systems to only what each employee needs. This reduces the potential damage from a successful social engineering attack.
  • Incident reporting culture -- Create an environment where employees feel safe reporting suspicious contacts without fear of punishment. The faster a social engineering attempt is reported, the faster the organization can respond.
  • Technical controls as a safety net -- While social engineering bypasses technical controls, measures like email authentication (SPF, DKIM, DMARC), multi-factor authentication, and data loss prevention tools add layers that can catch attacks that get past human defenses.

Building Resilience

Social engineering exploits human nature, and you cannot patch human nature. But you can build awareness, develop healthy habits of verification, and create organizational cultures that prioritize security without creating paranoia. The goal is not to make people suspicious of every interaction but to develop a reflex of pausing and verifying when something feels unusual.

The most effective defense against social engineering is not technology -- it is an informed, alert, and empowered human being who knows that it is always acceptable to say, "Let me verify that before I proceed."

Stay Informed on Security Threats

Our blog covers the latest in cybersecurity awareness, threat prevention, and digital safety. Explore more guides to protect yourself and your organization.

Learn More
Share:

Related Articles