Social Engineering: The 7 most common tricks cybercriminals use (and how to stop them)

Social engineering is one of the biggest cybersecurity threats out there. Instead of trying to hack into systems, cybercriminals manipulate people into giving away sensitive information or access. It’s a sneaky and highly effective way to bypass even the best technical security measures.

According to the UK’s Cyber Security Breaches Survey 2024, 32% of businesses and 24% of charities reported experiencing cyber breaches or attacks in the past 12 months, with phishing being one of the most common attack methods.

In this blog, we’ll break down the 7 most common social engineering techniques, how they work, and what you can do to protect yourself and your organisation.

1) Phishing

Phishing is when attackers send fake emails, messages, or links that look like they’re from a legitimate source – such as your bank, a colleague, or a well-known company. These messages often create a sense of urgency, tricking you into clicking a malicious link or sharing personal information like passwords or payment details.

How to spot phishing:

  • Look for spelling mistakes or unusual sender addresses.
  • Be cautious of unexpected emails asking for sensitive info.
  • Never click links without verifying their source.
  • Hover over links to check the actual URL before clicking.
  • Check for inconsistencies in email signatures or formatting.

 2) Pretexting, Impersonation, and Business Email Compromise (BEC)

While phishing typically involves mass distribution of fraudulent messages, pretexting, impersonation, and BEC take a more targeted approach. These attacks exploit trust and authority by tricking victims into believing they are interacting with a legitimate person or entity. Pretexting involves attackers creating a fabricated scenario to gain information, while impersonation and BEC involve fraudsters posing as trusted figures such as IT support, senior executives, or financial institutions. BEC is particularly dangerous as it can lead to fraudulent financial transactions and data breaches.

How to stay safe:

  • Verify requests through official channels before sharing sensitive information.
  • Encourage a culture of scepticism – Train staff to spot red flags in emails, such as unexpected requests, urgency or unusual sender behaviour.
  • Use multi-factor authentication to protect email accounts.
  • Regularly review and update email security settings.

 3) Baiting and Quid Pro Quo

Baiting relies on curiosity or greed to trick victims into exposing their systems, such as leaving infected USB drives in public places or offering free downloads containing malware. Quid pro quo, on the other hand, involves attackers offering something beneficial, like free tech support or exclusive access, in exchange for sensitive data.

How to avoid them:

  • Be cautious of unsolicited offers and giveaways that seem too good to be true.
  • Avoid using unknown USB devices or downloading files from unverified sources.
  • Implement strict policies on handling external devices and software.
  • Educate employees on the risks associated with unsolicited offers.

 4) Tailgating (or Piggybacking)

Tailgating is a physical security risk where an attacker gains access to restricted areas by closely following an authorised individual, such as pretending to be a delivery driver or claiming they’ve lost their credentials. Attackers often take advantage of polite or busy employees who hold doors open without verifying identity.

How to protect your organisation:

  • Always check credentials before letting someone in.
  • Don’t hold the door open for strangers in secure areas.
  • Use access control measures such as keycards or biometric authentication.
  • Report any suspicious individuals to security immediately.

 5) Vishing (Voice Phishing)

Vishing involves attackers making phone calls while pretending to be from trusted organisations like banks or IT departments. They often create a sense of urgency, claiming that immediate action is required to prevent financial loss or security breaches.

How to stay protected:

  • Never share personal details over the phone unless you’ve initiated the call.
  • Hang up and call the organisation back using a trusted number.
  • Be wary of urgent requests asking for sensitive information.
  • Use caller ID verification and block suspicious numbers.

 6) Smishing (SMS Phishing)

Smishing uses text messages to trick recipients into clicking malicious links or providing personal information. Attackers often impersonate trusted services like delivery companies, government agencies, or banks, asking you to confirm account details or track a package.

Tips to stay safe:

  • Be cautious of texts with urgent language or unexpected links.
  • Contact the company directly if you’re unsure.
  • Avoid clicking links in unsolicited messages.
  • Use spam filters and block unknown senders.

 7) Social Media Exploitation

Cybercriminals use social media to gather information about individuals and organisations, which can be leveraged for phishing attacks, identity theft, or impersonation. Oversharing personal details like birthdays, job titles, or travel plans can make it easier for attackers to target you.

Protect yourself by:

  • Limiting what you share publicly to minimise exposure.
  • Reviewing your privacy settings regularly to control who can see your posts.
  • Avoid accepting connection requests from unknown individuals.
  • Be mindful of the personal details shared in public posts or profiles.

At ramsac, we provide a range of services to help protect your organisation against social engineering attacks and enhance your overall security posture, these include the following;

Cybersecurity Awareness Training: Our training sessions educate employees about phishing, social engineering, and other common cyber threats. This ensures your team can recognise, respond to, and report suspicious activities.

secure+ Managed Security Service: Our proactive cybersecurity monitoring service detects and responds to threats in real-time, providing continuous protection for your organisation.

Phish Threat Simulations: We conduct simulated phishing attacks to test and improve your employees’ ability to identify and handle phishing attempts, reinforcing their training with practical experience.

By implementing these solutions, we can help your organisation build robust defences against social engineering attacks, safeguarding your data and ensuring business continuity.

Be cyber-secure with ramsac

There are two types of organisations; one’s who have suffered a cyberattack and those that will. Over 90% of successful hacks and data breaches start with phishing scams. Reports estimate that 3.4 billion malicious emails are sent daily worldwide. Don’t become part of the statistic. Make the secure choice today.

Related Posts

  • Protect your organisation with secure+ from ramsac

    Protect your organisation with secure+ from ramsac

    Cybersecurity

    Protect your organisation from evolving cyber threats with ramsac's secure+ A proactive monitoring solution designed to safeguard your systems, data, and reputation. [...]

    Read article

  • All you need to know about software vulnerabilities

    All you need to know about software vulnerabilities

    CybersecurityTechnical Blog

    Understanding software vulnerabilities is crucial for staying protected in an ever-evolving cyber landscape, where unpatched weaknesses can open the door to serious security threats for individuals and organisations alike. [...]

    Read article

  • Why your printer might be the biggest security risk in your office

    Why your printer might be the biggest security risk in your office

    Cybersecurity

    Think your office printer is harmless? Think again. Printers store data, connect to networks, and often have default passwords that cyber criminals love. Don't let your weakest link be the [...]

    Read article

  • The importance of cybersecurity contingency planning for businesses

    The importance of cybersecurity contingency planning for businesses

    Cybersecurity

    Protect your data from cybercriminals and minimise downtime with an effective cybersecurity contingency plan. Read on. [...]

    Read article

  • How to Spot a Scam HMRC Letter 

    How to Spot a Scam HMRC Letter 

    Cybersecurity

    Learn how to spot fraudulent communications, like fake HMRC letters, and take steps to protect your personal information and finances from scammers. [...]

    Read article

  • What is Data Loss Prevention (DLP)?

    What is Data Loss Prevention (DLP)?

    CybersecurityTechnical Blog

    Explore how Data Loss Prevention (DLP) strategies and tools protect sensitive data, ensure regulatory compliance, and mitigate risks from insider threats, enabling organisations to stay secure and resilient in [...]

    Read article

Quiz yourself

Are you more cyber savvy than an 11 year old?

11-14 year olds get asked these questions in school. Could you get these right?