Table of Contents
What Is Social Engineering?
Social engineering is the art of manipulating people into giving up confidential information or performing actions that compromise security. Unlike technical hacking, social engineering exploits human psychology — trust, fear, urgency, and helpfulness. It is often the easiest and most effective way to breach an organization's security.
According to industry reports, over 90% of successful cyberattacks begin with a social engineering component. Attackers have learned that it is often far easier to trick a human into opening a door than to break through a firewall. No matter how advanced your technical defenses are, a single deceived employee or family member can bypass all of them.
Common Social Engineering Techniques
Pretexting
The attacker creates a fabricated scenario to engage the victim. For example, posing as IT support calling about a "security issue" with your account, or pretending to be a new employee who needs help accessing a system. Effective pretexting involves research — the attacker learns enough about the target organization to sound convincing, referencing real department names, projects, or personnel.
Baiting
Offering something enticing to lure victims. This could be a USB drive labeled "Confidential — Salary Data" left in a parking lot, or a free software download that contains malware. Digital baiting includes fake advertisements for free premium software, pirated content, or too-good-to-be-true deals that require downloading a file or entering credentials.
Quid Pro Quo
Offering a service in exchange for information. A common example is an attacker calling random numbers at a company, posing as tech support, and offering to fix a problem in exchange for login credentials. Another variation involves attackers posing as researchers offering gift cards in exchange for completing a "survey" that asks for sensitive information.
Tailgating / Piggybacking
Physically following an authorized person through a secure door. The attacker might carry boxes or pretend to be on the phone, relying on the natural human tendency to hold doors open for others. This technique is remarkably effective in office buildings — most people feel uncomfortable challenging someone who appears to belong.
Phishing
The most widespread social engineering technique. Uses fake emails, texts, or websites to trick victims into revealing credentials or installing malware. Spear phishing targets specific individuals with personalized messages, while whaling targets senior executives with high-value access. See our detailed phishing guide for more information.
Vishing and Smishing
Vishing (voice phishing) uses phone calls, while smishing uses SMS text messages. These have become increasingly sophisticated, with attackers spoofing caller IDs to appear as banks, government agencies, or tech companies. AI-generated voice cloning has made vishing even more dangerous, as attackers can now mimic the voices of known contacts.
Why Social Engineering Works
Social engineering exploits fundamental human tendencies:
- Authority — We tend to comply with requests from authority figures without questioning them
- Urgency — Time pressure prevents careful thinking and bypasses our natural skepticism
- Social proof — If others seem to trust something, we follow their lead
- Reciprocity — We feel obligated to return favors, even unsolicited ones
- Fear — Threats about account suspension or legal action trigger panic and irrational responses
- Helpfulness — Most people want to be helpful, and attackers exploit this willingness
How to Protect Yourself
Verify Identity
- Always verify who you are talking to through an independent channel
- Call the company directly using a number from their official website, not a number provided in the suspicious message
- Be suspicious of unexpected contact, even from people who seem to know you
- Ask questions that only the real person would know the answer to
Slow Down
- Resist urgency — legitimate organizations allow time for verification
- If something feels wrong, trust your instinct; that sense of unease is often your brain detecting inconsistencies
- Take a pause before clicking, downloading, or sharing information
- Remember: any legitimate request can wait five minutes for you to verify it
Limit Information Sharing
- Be cautious about what personal information you share online — attackers use social media to research their targets
- Use strong, unique passwords so compromised knowledge cannot unlock accounts
- Remove metadata from files before sharing, as it can reveal personal details
- Be wary of oversharing on professional networks like LinkedIn, which are prime research sources for spear phishing
Educate Your Team
- Regular security awareness training dramatically reduces successful attacks
- Practice identifying social engineering attempts through simulated exercises
- Create a culture where questioning requests is encouraged, not punished
- Establish clear procedures for verifying identity and authorizing sensitive actions like wire transfers or password resets
Real-World Social Engineering Examples
Understanding real attacks helps you recognize patterns:
- CEO fraud — An attacker impersonates the CEO via email, urgently requesting a wire transfer to a "new vendor"
- IT impersonation — A caller claiming to be from IT asks employees to install "security software" that is actually malware
- Delivery scams — A text message about a "failed delivery" links to a credential-harvesting page
- Romance scams — Long-term relationships built online to eventually extract money or sensitive information
Social engineering succeeds because it targets the most vulnerable part of any security system — the human element. Awareness is your strongest defense. By understanding these techniques and building verification habits, you transform yourself from a potential victim into a hardened target.
Share this article

Raimundo Coelho
Cybersecurity specialist and technology professor with over 20 years of experience in IT. Graduated from Universidade Estácio de Sá. Writing practical guides to help you protect your data and stay safe in the digital world.