
{"id":3058,"date":"2016-02-16T00:00:00","date_gmt":"2016-02-16T00:00:00","guid":{"rendered":"http:\/\/otava.test\/how-to-protect-yourself-against-social-engineering\/"},"modified":"2016-02-16T00:00:00","modified_gmt":"2016-02-16T00:00:00","slug":"how-to-protect-yourself-against-social-engineering","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/how-to-protect-yourself-against-social-engineering\/","title":{"rendered":"How to protect yourself against social engineering"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-16210\" src=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/hacker-computer_49958157.jpg\" alt=\"Protect against social engineering\" width=\"350\" height=\"234\" \/><strong>What is social engineering?<\/strong> It\u2019s the art of manipulation that relies heavily on human interaction and psychology to trick people into revealing sensitive information about themselves or others. Social engineering works to exploit the human inclination to trust others, and for that reason, it\u2019s one of the most dangerous and murky threats facing organizations today. Think about it\u2014why waste time trying to crack a password that could take hours or days, when you could get someone at the company to hand it to you in minutes?<\/p>\n<p>You are only as strong as your weakest link. And typically, the weakest link isn\u2019t your firewall or alarm system, but humans. All the technical protection in the world can\u2019t protect you if an employee gives the keys to the kingdom away.<\/p>\n<p>There are so <a href=\"https:\/\/www.wired.com\/2014\/01\/my-epic-hack-revisited\/\" target=\"_blank\" rel=\"noopener noreferrer\">many stories<\/a> of <a href=\"https:\/\/www.darkreading.com\/the-7-best-social-engineering-attacks-ever\/d\/d-id\/1319411\" target=\"_blank\" rel=\"noopener noreferrer\">people or companies<\/a> tricked into <a href=\"https:\/\/www.wired.com\/2012\/09\/cosmo-the-god-who-fell-to-earth\/\" target=\"_blank\" rel=\"noopener noreferrer\">giving up information<\/a> by deceptively simple methods, that it can quickly become overwhelming. \u00a0How can you protect your company from social engineers and attackers who take advantage of these methods?<\/p>\n<p>For a company, one of the best ways to combat potential scammers is to educate employees on standard policies and procedures, and emphasize the importance of awareness. Know what <a href=\"https:\/\/www.consumer.ftc.gov\/articles\/0003-phishing\" target=\"_blank\" rel=\"noopener noreferrer\">phishing<\/a>, <a href=\"https:\/\/www.trustwave.com\/Resources\/SpiderLabs-Blog\/Baiting-Attack-Exercise-%E2%80%93-The-Old-School-Way-Still-Works\/\" target=\"_blank\" rel=\"noopener noreferrer\">baiting<\/a>\u00a0and <a href=\"https:\/\/blog.backupify.com\/2013\/06\/24\/5-types-of-social-engineering-attacks\/\" target=\"_blank\" rel=\"noopener noreferrer\">pretexting<\/a>\u00a0are, and learn to recognize the signs of these techniques.<\/p>\n<p>If an attacker sends an email saying your anti-virus program has expired and you should download the new file right away, do you know what your company\u2019s real anti-virus software looks like? Who those requests would normally come from? Do you know the right person to ask if you are unsure what to do?<\/p>\n<p>TV shows and movies that show the daring spy posing as a janitor, lost tourist, or debonair at a ball are examples of social engineering. Even if some of the Hollywood scenarios are a little more far-fetched, they can still offer lessons. No matter how ridiculous the stunt is that the spy is pulling off, he always has the confidence to do it, and that\u2019s what is important to note. Confidence is key.<\/p>\n<p>Social engineers are very suave, <a href=\"https:\/\/www.guidance-consulting.com\/articles\/94-how-hackers-use-social-engineering-to-get-inside.html\" target=\"_blank\" rel=\"noopener noreferrer\">smooth-talking people<\/a>. They may assume an authoritative tone and claim they are acting on behalf of corporate management to demand a password reset or other information. Again, this is where <strong>company security training is beneficial<\/strong>. If employees are aware of who is actually authorized to make such requests and how those procedures should be handled, it is easier to detect a fraudulent request. Confident employees who are comfortable in their knowledge of company procedures have just thwarted a major tool for social engineers.<\/p>\n<p>Awareness of your surroundings is key, too. The character Mad Eye Moody from Harry Potter has it right: \u201cConstant vigilance, Harry, constant vigilance!\u201d People are always trying to access your information. Hours of operation are all day, every day. \u201cWhereas the normal IT Director goes home at 5 or 6 p.m., the hacker will work 24 hours a day to accomplish his\/her goal,\u201d according to <a href=\"https:\/\/www.social-engineer.org\/framework\/general-discussion\/categories-social-engineers\/hackers\/\" target=\"_blank\" rel=\"noopener noreferrer\">social-engineer.org<\/a>. It\u2019s important to remember that there are people who will stop at nothing to get your personal information. Make a note of strangers you see entering the building, and while you might be called rude, don\u2019t hold the door open for anyone. Tailgating is a popular method for hackers (or anyone) to enter a normally locked building, and once inside, they can make their way about without worry. Don\u2019t be afraid to speak up if you see suspicious activity in and around your building.<\/p>\n<p><strong>Training your employees to recognize signs of a non-technical attack is the best way to protect against potential threats from others.<\/strong> If you have a deep level of knowledge about company policies and procedures, or know how to detect signs of social engineering, share that with your employees! This kind of information sharing is good. If you are in charge of company security and aren\u2019t confident your skills are up to speed, hire a consultant who is, and learn from them alongside your coworkers. Hackers are everywhere, and while that thought sounds scary, it\u2019s very possible to protect yourself by remaining aware and vigilant about your surroundings.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is social engineering? It\u2019s the art of manipulation that relies heavily on human interaction and psychology to trick people into revealing sensitive information about themselves or others. Social engineering works to exploit the human inclination to trust others, and for that reason, it\u2019s one of the most dangerous and murky threats facing organizations today. Think about it\u2014why waste time trying to crack a password that could take hours or days, when you could get someone at the company to hand it to you in minutes? You are only as strong as your weakest link. And typically, the weakest link isn\u2019t your firewall or alarm system, but humans. All the technical protection in the world can\u2019t protect you if an employee gives the keys to the kingdom away. There are so many stories of people or companies tricked into giving up information by deceptively simple methods, that it can quickly become overwhelming. \u00a0How can you protect your company from social engineers and attackers who take advantage of these methods? For a company, one of the best ways to combat potential scammers is to educate employees on standard policies and procedures, and emphasize the importance of awareness. Know what phishing, baiting\u00a0and&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-3058","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How to protect yourself against social engineering | OTAVA<\/title>\n<meta name=\"description\" content=\"Social engineering exploits the human inclination to trust others. It\u2019s one of the most dangerous and murky threats facing organizations today.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/how-to-protect-yourself-against-social-engineering\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to protect yourself against social engineering\" \/>\n<meta property=\"og:description\" content=\"Social engineering exploits the human inclination to trust others. It\u2019s one of the most dangerous and murky threats facing organizations today.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/how-to-protect-yourself-against-social-engineering\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2016-02-16T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/hacker-computer_49958157.jpg\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/how-to-protect-yourself-against-social-engineering\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/how-to-protect-yourself-against-social-engineering\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"How to protect yourself against social engineering\",\"datePublished\":\"2016-02-16T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/how-to-protect-yourself-against-social-engineering\/\"},\"wordCount\":703,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/how-to-protect-yourself-against-social-engineering\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/hacker-computer_49958157.jpg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/how-to-protect-yourself-against-social-engineering\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/how-to-protect-yourself-against-social-engineering\/\",\"url\":\"https:\/\/www.otava.com\/blog\/how-to-protect-yourself-against-social-engineering\/\",\"name\":\"How to protect yourself against social engineering | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/how-to-protect-yourself-against-social-engineering\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/how-to-protect-yourself-against-social-engineering\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/hacker-computer_49958157.jpg\",\"datePublished\":\"2016-02-16T00:00:00+00:00\",\"description\":\"Social engineering exploits the human inclination to trust others. It\u2019s one of the most dangerous and murky threats facing organizations today.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/how-to-protect-yourself-against-social-engineering\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/how-to-protect-yourself-against-social-engineering\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/how-to-protect-yourself-against-social-engineering\/#primaryimage\",\"url\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/hacker-computer_49958157.jpg\",\"contentUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/hacker-computer_49958157.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/how-to-protect-yourself-against-social-engineering\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to protect yourself against social engineering\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to protect yourself against social engineering | OTAVA","description":"Social engineering exploits the human inclination to trust others. It\u2019s one of the most dangerous and murky threats facing organizations today.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/how-to-protect-yourself-against-social-engineering\/","og_locale":"en_US","og_type":"article","og_title":"How to protect yourself against social engineering","og_description":"Social engineering exploits the human inclination to trust others. It\u2019s one of the most dangerous and murky threats facing organizations today.","og_url":"https:\/\/www.otava.com\/blog\/how-to-protect-yourself-against-social-engineering\/","og_site_name":"OTAVA","article_published_time":"2016-02-16T00:00:00+00:00","og_image":[{"url":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/hacker-computer_49958157.jpg","type":"","width":"","height":""}],"author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/how-to-protect-yourself-against-social-engineering\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/how-to-protect-yourself-against-social-engineering\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"How to protect yourself against social engineering","datePublished":"2016-02-16T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/how-to-protect-yourself-against-social-engineering\/"},"wordCount":703,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/how-to-protect-yourself-against-social-engineering\/#primaryimage"},"thumbnailUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/hacker-computer_49958157.jpg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/how-to-protect-yourself-against-social-engineering\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/how-to-protect-yourself-against-social-engineering\/","url":"https:\/\/www.otava.com\/blog\/how-to-protect-yourself-against-social-engineering\/","name":"How to protect yourself against social engineering | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/how-to-protect-yourself-against-social-engineering\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/how-to-protect-yourself-against-social-engineering\/#primaryimage"},"thumbnailUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/hacker-computer_49958157.jpg","datePublished":"2016-02-16T00:00:00+00:00","description":"Social engineering exploits the human inclination to trust others. It\u2019s one of the most dangerous and murky threats facing organizations today.","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/how-to-protect-yourself-against-social-engineering\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/how-to-protect-yourself-against-social-engineering\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/how-to-protect-yourself-against-social-engineering\/#primaryimage","url":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/hacker-computer_49958157.jpg","contentUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/hacker-computer_49958157.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/how-to-protect-yourself-against-social-engineering\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"How to protect yourself against social engineering"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/3058","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=3058"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/3058\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=3058"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=3058"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=3058"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=3058"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}