social-engineering (1)-min

Social Engineering Risks: 6 Rules For Preventing Them

who this class is for

Employees and managers

Test your knowledge with a quick test and earn a free micro-certificate

Shop for etiquette, behavioral, and contextual signs

About this micro-class

Social engineering is a tactic that cybercriminals often use to exploit human psychology rather than technical vulnerabilities.

The human factor is often the weakest link in security. By staying informed and adopting best practices, we can strengthen our defenses against social engineering threats.

How to prevent Social Engineering

1. Definition of Social Engineering

Social engineering is the art of manipulating people into divulging confidential information or taking actions that may compromise security.

2. Common Social Engineering Techniques


Fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity.


Creating a fabricated scenario to obtain information from a target.


Offering something enticing to lure individuals into a trap.

3. Indicators of a Social Engineering Attempt

red fla

Unsolicited emails or messages asking for sensitive information.

Urgency or fear tactics to prompt immediate action.

Requests for confidential information via phone or email.

4. Preventive Measures

Verify Requests

Double-check any unusual requests, especially those involving sensitive information, by contacting the person through a known, legitimate channel.

Employee Training

Companies should regularly educate employees about social engineering tactics and how to recognize them.

Use Strong Authentication

Implement multi-factor authentication to add an extra layer of security.

Keep Software Updated

Ensure that all software and systems are patched and up to date to protect against known vulnerabilities.

Reporting Incidents

If you suspect a social engineering attempt, report it immediately to the IT or security team. Timely reporting can help prevent potential security breaches.

5. Protecting Personal Information

Be cautious about sharing personal or company information online or over the phone.

Regularly review privacy settings on social media platforms and limit the information shared publicly.

6. Building a Security Culture

Security is everyone’s responsibility.

Encourage a culture of awareness and openness about potential security threats.

Foster an environment where employees feel comfortable reporting suspicious activities.

Example Scenario

Consider a scenario where you receive an email from an unknown sender claiming to be from IT support, asking for your login credentials.

Instead of responding, verify the request with the IT department through a trusted means.

Test your knowledge with a quick test and earn a free micro-certificate

Shop for etiquette, behavioral, and contextual signs

related micro-classes