{"id":1374938,"date":"2023-07-04T12:12:47","date_gmt":"2023-07-04T12:12:47","guid":{"rendered":"https:\/\/www.collaboris.com\/?p=1374938"},"modified":"2023-08-03T12:09:28","modified_gmt":"2023-08-03T12:09:28","slug":"cybersecurity-best-practices-social-engineering","status":"publish","type":"post","link":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-engineering\/","title":{"rendered":"Cybersecurity best practices : Social engineering"},"content":{"rendered":"<h1>Cybersecurity best practices : Social engineering<\/h1>\n<p><span><img decoding=\"async\" alt=\"image showing social engineering\" data-id=\"1374951\" width=\"799\" data-init-width=\"2560\" height=\"280\" data-init-height=\"896\" title=\"cyber security social engineering\" loading=\"lazy\" src=\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2023\/07\/cyber-security-social-engineering-narrow-scaled.jpg?_t=1688473351\" data-link-wrap=\"true\" data-width=\"799\" data-height=\"280\" style=\"aspect-ratio: auto 2560 \/ 896;\"><\/span><\/p>\n<p>Social engineering is the use of psychological manipulation to trick people into divulging sensitive information. In this post, we will discuss common social engineering tactics and how to recognize and avoid them. We will also cover the importance of verifying requests for sensitive information and how to do so securely.<\/p>\n<h2 data-block-id=\"block-256d63cd-77c5-414c-96c9-908a9c483892\" style=\"\">Common social engineering tactics<\/h2>\n<p>Social engineering is a malicious tactic employed by cybercriminals to manipulate individuals into revealing confidential information or performing actions that may jeopardize their security. Cybercriminals use various social engineering tactics such as phishing emails, pretexting, baiting, and quid pro quo to achieve their objectives.<\/p>\n<p><strong>Phishing emails<\/strong> are fraudulent messages that appear to be from trustworthy sources like banks or government agencies, with the intention of deceiving users into clicking on links or downloading attachments that contain malware.<\/p>\n<p><strong>Pretexting<\/strong> involves creating a false scenario to obtain access to sensitive information, while baiting involves leaving an enticing item, like a USB drive, in a public place, hoping someone will pick it up and plug it into their computer.<\/p>\n<p><strong>Quid pro quo<\/strong> involves offering something valuable in exchange for sensitive information, such as promising a gift card in return for login credentials.<\/p>\n<p>It is crucial to be aware of these social engineering tactics and always verify the authenticity of requests for information before sharing any sensitive data. Cybercriminals can be very convincing, so it&#8217;s essential to scrutinize every request for personal information, especially if it comes from an unknown source. Always double-check the sender&#8217;s email address, hover over links to see where they lead, and avoid downloading attachments from unknown sources. By being vigilant and cautious, you can protect yourself from falling victim to social engineering attacks.<\/p>\n<h2 data-block-id=\"block-8c66b1b3-64a5-434d-9a87-0ff8cc907d19\" style=\"\">How to recognize and avoid social engineering tactics<\/h2>\n<p>To avoid falling victim to social engineering, it is important to be aware of common tactics such as phishing emails, pretexting, and baiting. Always verify the identity of the person or organization requesting information. Also, never share personal information unless you are certain it is necessary and legitimate. Additionally, be cautious when clicking on links or downloading attachments from unknown sources. Keep your software and security systems up to date to prevent vulnerabilities that can be exploited by social engineers. By staying vigilant and informed, you can protect yourself and your sensitive information from social engineering attacks.<\/p>\n<p>  <span style=\"\"><img decoding=\"async\" alt=\"\" data-id=\"1375149\" width=\"196\" data-init-width=\"847\" height=\"276\" data-init-height=\"1196\" title=\"essential guide to cybersecurity ebook cropped\" loading=\"lazy\" src=\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2023\/08\/essential-guide-to-cybersecurity-ebook-cropped.png?_t=1690979525\" data-link-wrap=\"true\" data-width=\"196\" data-height=\"276\" style=\"aspect-ratio: auto 847 \/ 1196;\" ml-d=\"0\" mt-d=\"0\" center-h-d=\"true\" ml-m=\"0\" mt-m=\"0\" ml-t=\"0\" mt-t=\"0\"><\/span><\/p>\n<h3 style=\"color: rgb(52, 52, 52) !important; --tcb-applied-color:#343434 !important;\">Get your free cybersecurity best practices guide<\/h3>\n<p style=\"\">This eBook contains all 10 posts in our cybersecurity series in one handy downloadable guide so you can read it at your leisure.<\/p>\n<p>__CONFIG_colors_palette__{&#8220;active_palette&#8221;:0,&#8221;config&#8221;:{&#8220;colors&#8221;:{&#8220;8eb49&#8221;:{&#8220;name&#8221;:&#8221;Main Accent&#8221;,&#8221;parent&#8221;:-1}},&#8221;gradients&#8221;:[]},&#8221;palettes&#8221;:[{&#8220;name&#8221;:&#8221;Default Palette&#8221;,&#8221;value&#8221;:{&#8220;colors&#8221;:{&#8220;8eb49&#8221;:{&#8220;val&#8221;:&#8221;rgb(0, 47, 64)&#8221;}},&#8221;gradients&#8221;:[]},&#8221;original&#8221;:{&#8220;colors&#8221;:{&#8220;8eb49&#8221;:{&#8220;val&#8221;:&#8221;rgb(19, 114, 211)&#8221;,&#8221;hsl&#8221;:{&#8220;h&#8221;:210,&#8221;s&#8221;:0.83,&#8221;l&#8221;:0.45,&#8221;a&#8221;:1}}},&#8221;gradients&#8221;:[]}}]}__CONFIG_colors_palette__ <a href=\"https:\/\/www.collaboris.com\/cybersecurity-guide\/\" target=\"_blank\" rel=\"noopener\"><span style=\"\">    <\/span> <span style=\"\"><span data-tcb_hover_state_parent=\"\" style=\"\">Get y<span style=\"background-color: transparent;\"><\/span>our free eBook<\/span><\/span> <\/a>  <\/p>\n<h2 data-block-id=\"block-8e14b983-d1ad-4d2d-9ab1-192c30f8cc67\" style=\"\">The importance of verifying requests for sensitive information<\/h2>\n<p>It is crucial to verify requests for sensitive information in order to protect oneself and the organization from potential harm. Hackers and scammers often use social engineering tactics to trick individuals into divulging confidential information, such as passwords or financial data. Verifying the legitimacy of a request can help prevent these types of attacks and ensure that sensitive information remains secure. This can be done by double-checking the identity of the requester, confirming the purpose of the request, and using secure communication channels to transmit any sensitive information. By taking these precautions, individuals and organizations can safeguard themselves against potential security breaches and maintain the confidentiality of their sensitive data.<\/p>\n<h2 data-block-id=\"block-5b5d1b5e-b9ba-400d-a571-dc4524a13fc1\" style=\"\">How to securely respond to sensitive information requests<\/h2>\n<p>When responding to requests for sensitive information, it is important to prioritize security.<\/p>\n<p>1) Start by verifying the identity of the requester and ensuring that they have a legitimate need for the information.<\/p>\n<p>2) Use secure communication channels such as encrypted email or password-protected files to transmit the information. Additionally, limit the amount of information shared to only what is necessary and avoid including any unnecessary personal details.<\/p>\n<p>3) Finally, be sure to properly dispose of any physical copies of the information once the request has been fulfilled.<\/p>\n<p>By following these steps, you can help ensure that sensitive information remains protected.<\/p>\n<h2 style=\"\">Other posts in this series:<\/h2>\n<p><a href=\"https:\/\/www.collaboris.com\/essential-cybersecurity-guide\/\" style=\"outline: none;\" target=\"_blank\" data-tcb_hover_state_parent=\"\" rel=\"noopener\">Introduction to cyber security<\/a><\/p>\n<ol>\n<li><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-password-management\/\" style=\"outline: none;\" target=\"_blank\" data-tcb_hover_state_parent=\"\" rel=\"noopener\">Password management<\/a><\/li>\n<li><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-malware\/\" style=\"outline: none;\" target=\"_blank\" data-tcb_hover_state_parent=\"\" rel=\"noopener\">Malware<\/a><\/li>\n<li>Social engineering (this post)<\/li>\n<li><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-phishing-scams\/\" style=\"outline: none;\" target=\"_blank\" data-tcb_hover_state_parent=\"\" rel=\"noopener\">Phishing scams<\/a><\/li>\n<li><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-media-security\/\" style=\"outline: none;\" target=\"_blank\" data-tcb_hover_state_parent=\"\" rel=\"noopener\">Social media security<\/a><\/li>\n<li><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-wifi-network-security\/\" style=\"outline: none;\" target=\"_blank\" data-tcb_hover_state_parent=\"\" rel=\"noopener\">Wi-Fi and network security<\/a><\/li>\n<li><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-mobile-device-security\/\" style=\"outline: none;\" target=\"_blank\" data-tcb_hover_state_parent=\"\" rel=\"noopener\">Mobile device security<\/a><\/li>\n<li><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-data-protection-backup\/\" style=\"outline: none;\" target=\"_blank\" data-tcb_hover_state_parent=\"\" rel=\"noopener\">Data protection and backup<\/a><\/li>\n<li><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-safe-web-browsing\/\" style=\"outline: none;\" target=\"_blank\" data-tcb_hover_state_parent=\"\" rel=\"noopener\">Safe web browsing<\/a><\/li>\n<li><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/\" style=\"outline: none;\" target=\"_blank\" data-tcb_hover_state_parent=\"\" rel=\"noopener\">Incident reporting<\/a><\/li>\n<\/ol>\n<h2 style=\"\">You may also like:<\/h2>\n<p style=\"font-size: var(--tve-font-size, 13px);\"><span data-shortcode=\"tcb_post_published_date\" data-shortcode-name=\"Post date\" data-extra_key=\"\" data-attr-type=\"published\" data-attr-date-format-select=\"F j, Y\" data-attr-date-format=\"F j, Y\" data-attr-show-time=\"0\" data-attr-time-format-select=\"g:i a\" data-attr-time-format=\"\" data-attr-link=\"0\" data-attr-target=\"1\" data-attr-rel=\"0\" data-option-inline=\"1\">July 4, 2023 <\/span><\/p>\n<h2 style=\"\"><span data-shortcode=\"tcb_post_title\" data-shortcode-name=\"Post title\" data-extra_key=\"\" data-attr-link=\"1\" data-attr-target=\"0\" data-attr-rel=\"0\" data-option-inline=\"1\" data-attr-static-link=\"{&quot;className&quot;:&quot;&quot;,&quot;href&quot;:&quot;https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/&quot;,&quot;title&quot;:&quot;Cybersecurity best practices : Incident reporting&quot;,&quot;class&quot;:&quot;&quot;}\" data-attr-css=\"\"><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/\" title=\"Cybersecurity best practices : Incident reporting\" data-css=\"\">Cybersecurity best practices : Incident reporting<\/a><\/span><\/h2>\n<p>Cybersecurity best practices : Incident reportingThe security of systems and data is of utmost <a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/#more-1375042\">&#8230;<\/a><\/p>\n<p><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/\"><span><span>Read More<\/span><\/span><\/a><\/p>\n<p style=\"font-size: var(--tve-font-size, 13px);\"><span data-shortcode=\"tcb_post_published_date\" data-shortcode-name=\"Post date\" data-extra_key=\"\" data-attr-type=\"published\" data-attr-date-format-select=\"F j, Y\" data-attr-date-format=\"F j, Y\" data-attr-show-time=\"0\" data-attr-time-format-select=\"g:i a\" data-attr-time-format=\"\" data-attr-link=\"0\" data-attr-target=\"1\" data-attr-rel=\"0\" data-option-inline=\"1\">July 4, 2023 <\/span><\/p>\n<h2 style=\"\"><span data-shortcode=\"tcb_post_title\" data-shortcode-name=\"Post title\" data-extra_key=\"\" data-attr-link=\"1\" data-attr-target=\"0\" data-attr-rel=\"0\" data-option-inline=\"1\" data-attr-static-link=\"{&quot;className&quot;:&quot;&quot;,&quot;href&quot;:&quot;https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/&quot;,&quot;title&quot;:&quot;Cybersecurity best practices : Incident reporting&quot;,&quot;class&quot;:&quot;&quot;}\" data-attr-css=\"\"><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-safe-web-browsing\/\" title=\"Cybersecurity best practices : Safe web browsing\" data-css=\"\">Cybersecurity best practices : Safe web browsing<\/a><\/span><\/h2>\n<p>Cybersecurity best practices : Safe Web BrowsingIn today&#8217;s digital age, it is crucial to <a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-safe-web-browsing\/#more-1375032\">&#8230;<\/a><\/p>\n<p><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-safe-web-browsing\/\"><span><span>Read More<\/span><\/span><\/a><\/p>\n<p style=\"font-size: var(--tve-font-size, 13px);\"><span data-shortcode=\"tcb_post_published_date\" data-shortcode-name=\"Post date\" data-extra_key=\"\" data-attr-type=\"published\" data-attr-date-format-select=\"F j, Y\" data-attr-date-format=\"F j, Y\" data-attr-show-time=\"0\" data-attr-time-format-select=\"g:i a\" data-attr-time-format=\"\" data-attr-link=\"0\" data-attr-target=\"1\" data-attr-rel=\"0\" data-option-inline=\"1\">July 4, 2023 <\/span><\/p>\n<h2 style=\"\"><span data-shortcode=\"tcb_post_title\" data-shortcode-name=\"Post title\" data-extra_key=\"\" data-attr-link=\"1\" data-attr-target=\"0\" data-attr-rel=\"0\" data-option-inline=\"1\" data-attr-static-link=\"{&quot;className&quot;:&quot;&quot;,&quot;href&quot;:&quot;https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/&quot;,&quot;title&quot;:&quot;Cybersecurity best practices : Incident reporting&quot;,&quot;class&quot;:&quot;&quot;}\" data-attr-css=\"\"><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-data-protection-backup\/\" title=\"Cybersecurity best practices : Data protection and back up\" data-css=\"\">Cybersecurity best practices : Data protection and back up<\/a><\/span><\/h2>\n<p>Cybersecurity best practices : Data protection and backupRegularly backing up important data and storing <a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-data-protection-backup\/#more-1375019\">&#8230;<\/a><\/p>\n<p><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-data-protection-backup\/\"><span><span>Read More<\/span><\/span><\/a><\/p>\n<p style=\"font-size: var(--tve-font-size, 13px);\"><span data-shortcode=\"tcb_post_published_date\" data-shortcode-name=\"Post date\" data-extra_key=\"\" data-attr-type=\"published\" data-attr-date-format-select=\"F j, Y\" data-attr-date-format=\"F j, Y\" data-attr-show-time=\"0\" data-attr-time-format-select=\"g:i a\" data-attr-time-format=\"\" data-attr-link=\"0\" data-attr-target=\"1\" data-attr-rel=\"0\" data-option-inline=\"1\">July 4, 2023 <\/span><\/p>\n<h2 style=\"\"><span data-shortcode=\"tcb_post_title\" data-shortcode-name=\"Post title\" data-extra_key=\"\" data-attr-link=\"1\" data-attr-target=\"0\" data-attr-rel=\"0\" data-option-inline=\"1\" data-attr-static-link=\"{&quot;className&quot;:&quot;&quot;,&quot;href&quot;:&quot;https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/&quot;,&quot;title&quot;:&quot;Cybersecurity best practices : Incident reporting&quot;,&quot;class&quot;:&quot;&quot;}\" data-attr-css=\"\"><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-mobile-device-security\/\" title=\"Cybersecurity best practices : Mobile device security\" data-css=\"\">Cybersecurity best practices : Mobile device security<\/a><\/span><\/h2>\n<p>Cybersecurity best practices : Mobile device securityMobile devices pose various security risks that can <a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-mobile-device-security\/#more-1375003\">&#8230;<\/a><\/p>\n<p><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-mobile-device-security\/\"><span><span>Read More<\/span><\/span><\/a><\/p>\n<p style=\"font-size: var(--tve-font-size, 13px);\"><span data-shortcode=\"tcb_post_published_date\" data-shortcode-name=\"Post date\" data-extra_key=\"\" data-attr-type=\"published\" data-attr-date-format-select=\"F j, Y\" data-attr-date-format=\"F j, Y\" data-attr-show-time=\"0\" data-attr-time-format-select=\"g:i a\" data-attr-time-format=\"\" data-attr-link=\"0\" data-attr-target=\"1\" data-attr-rel=\"0\" data-option-inline=\"1\">July 4, 2023 <\/span><\/p>\n<h2 style=\"\"><span data-shortcode=\"tcb_post_title\" data-shortcode-name=\"Post title\" data-extra_key=\"\" data-attr-link=\"1\" data-attr-target=\"0\" data-attr-rel=\"0\" data-option-inline=\"1\" data-attr-static-link=\"{&quot;className&quot;:&quot;&quot;,&quot;href&quot;:&quot;https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/&quot;,&quot;title&quot;:&quot;Cybersecurity best practices : Incident reporting&quot;,&quot;class&quot;:&quot;&quot;}\" data-attr-css=\"\"><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-wifi-network-security\/\" title=\"Cybersecurity best practices : Wi-Fi and Network security\" data-css=\"\">Cybersecurity best practices : Wi-Fi and Network security<\/a><\/span><\/h2>\n<p>Cybersecurity best practices : Wi-Fi and Network securityThe Risks of Unsecured Wi-Fi NetworksConnecting to <a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-wifi-network-security\/#more-1374983\">&#8230;<\/a><\/p>\n<p><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-wifi-network-security\/\"><span><span>Read More<\/span><\/span><\/a><\/p>\n<p style=\"font-size: var(--tve-font-size, 13px);\"><span data-shortcode=\"tcb_post_published_date\" data-shortcode-name=\"Post date\" data-extra_key=\"\" data-attr-type=\"published\" data-attr-date-format-select=\"F j, Y\" data-attr-date-format=\"F j, Y\" data-attr-show-time=\"0\" data-attr-time-format-select=\"g:i a\" data-attr-time-format=\"\" data-attr-link=\"0\" data-attr-target=\"1\" data-attr-rel=\"0\" data-option-inline=\"1\">July 4, 2023 <\/span><\/p>\n<h2 style=\"\"><span data-shortcode=\"tcb_post_title\" data-shortcode-name=\"Post title\" data-extra_key=\"\" data-attr-link=\"1\" data-attr-target=\"0\" data-attr-rel=\"0\" data-option-inline=\"1\" data-attr-static-link=\"{&quot;className&quot;:&quot;&quot;,&quot;href&quot;:&quot;https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/&quot;,&quot;title&quot;:&quot;Cybersecurity best practices : Incident reporting&quot;,&quot;class&quot;:&quot;&quot;}\" data-attr-css=\"\"><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-media-security\/\" title=\"Cybersecurity best practices : Social media security\" data-css=\"\">Cybersecurity best practices : Social media security<\/a><\/span><\/h2>\n<p>Cybersecurity best practices : Social media securitySocial media security refers to the measures taken <a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-media-security\/#more-1374967\">&#8230;<\/a><\/p>\n<p><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-media-security\/\"><span><span>Read More<\/span><\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity best practices : Social engineering Social engineering is the use of psychological manipulation to trick people into divulging sensitive information. In this post, we will discuss common social engineering tactics and how to recognize and avoid them. We will also cover the importance of verifying requests for sensitive information and how to do so [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":2109,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_lmt_disableupdate":"no","_lmt_disable":"","footnotes":""},"categories":[6],"tags":[],"class_list":["post-1374938","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-policy-management"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.9 (Yoast SEO v26.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity best practices : Social engineering<\/title>\n<meta name=\"description\" content=\"Social engineering is the use of psychological manipulation to trick people into divulging sensitive information.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-engineering\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity best practices : Social engineering\" \/>\n<meta property=\"og:description\" content=\"Social engineering is the use of psychological manipulation to trick people into divulging sensitive information. In this module, we will discuss common social engineering tactics and how to recognize and avoid them. We will also cover the importance of verifying requests for sensitive information and how to do so securely\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-engineering\/\" \/>\n<meta property=\"og:site_name\" content=\"Collaboris\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Collaboris\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-04T12:12:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-03T12:09:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2023\/07\/cyber-security-social-engineering-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Helen Jones\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@helen.jones@collaboris.co.uk\" \/>\n<meta name=\"twitter:site\" content=\"@Collaboris\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Helen Jones\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-engineering\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-engineering\/\"},\"author\":{\"name\":\"Helen Jones\",\"@id\":\"https:\/\/www.collaboris.com\/#\/schema\/person\/df8a602d5db57fce86940a1aa6385aef\"},\"headline\":\"Cybersecurity best practices : Social engineering\",\"datePublished\":\"2023-07-04T12:12:47+00:00\",\"dateModified\":\"2023-08-03T12:09:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-engineering\/\"},\"wordCount\":867,\"publisher\":{\"@id\":\"https:\/\/www.collaboris.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-engineering\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg\",\"articleSection\":[\"Policy Management\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-engineering\/\",\"url\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-engineering\/\",\"name\":\"Cybersecurity best practices : Social engineering\",\"isPartOf\":{\"@id\":\"https:\/\/www.collaboris.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-engineering\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-engineering\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg\",\"datePublished\":\"2023-07-04T12:12:47+00:00\",\"dateModified\":\"2023-08-03T12:09:28+00:00\",\"description\":\"Social engineering is the use of psychological manipulation to trick people into divulging sensitive information.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-engineering\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-engineering\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-engineering\/#primaryimage\",\"url\":\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg\",\"contentUrl\":\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg\",\"width\":820,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-engineering\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.collaboris.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity best practices : Social engineering\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.collaboris.com\/#website\",\"url\":\"https:\/\/www.collaboris.com\/\",\"name\":\"Collaboris\",\"description\":\"We make compliance simple\",\"publisher\":{\"@id\":\"https:\/\/www.collaboris.com\/#organization\"},\"alternateName\":\"DocRead\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.collaboris.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.collaboris.com\/#organization\",\"name\":\"Collaboris\",\"alternateName\":\"DocRead\",\"url\":\"https:\/\/www.collaboris.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.collaboris.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2021\/05\/collaboris_logo_small.png\",\"contentUrl\":\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2021\/05\/collaboris_logo_small.png\",\"width\":150,\"height\":40,\"caption\":\"Collaboris\"},\"image\":{\"@id\":\"https:\/\/www.collaboris.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Collaboris\/\",\"https:\/\/x.com\/Collaboris\",\"https:\/\/www.linkedin.com\/company\/collaboris\"],\"description\":\"Collaboris is a Software company that created a policy management tool called DocRead.\",\"email\":\"info@collaboris.com\",\"telephone\":\"02079935140\",\"legalName\":\"Collaboris Ltd\",\"foundingDate\":\"2007-12-03\",\"vatID\":\"GB928895360\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"1\",\"maxValue\":\"10\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.collaboris.com\/#\/schema\/person\/df8a602d5db57fce86940a1aa6385aef\",\"name\":\"Helen Jones\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.collaboris.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cb6011a4dfb291a2bb0e30fb70581537bb77c6e70a1c8e887e16ae98fc5b518d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cb6011a4dfb291a2bb0e30fb70581537bb77c6e70a1c8e887e16ae98fc5b518d?s=96&d=mm&r=g\",\"caption\":\"Helen Jones\"},\"sameAs\":[\"https:\/\/x.com\/helen.jones@collaboris.co.uk\"],\"url\":\"https:\/\/www.collaboris.com\/author\/helen-jones\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity best practices : Social engineering","description":"Social engineering is the use of psychological manipulation to trick people into divulging sensitive information.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-engineering\/","og_locale":"en_GB","og_type":"article","og_title":"Cybersecurity best practices : Social engineering","og_description":"Social engineering is the use of psychological manipulation to trick people into divulging sensitive information. In this module, we will discuss common social engineering tactics and how to recognize and avoid them. We will also cover the importance of verifying requests for sensitive information and how to do so securely","og_url":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-engineering\/","og_site_name":"Collaboris","article_publisher":"https:\/\/www.facebook.com\/Collaboris\/","article_published_time":"2023-07-04T12:12:47+00:00","article_modified_time":"2023-08-03T12:09:28+00:00","og_image":[{"width":2560,"height":1440,"url":"https:\/\/www.collaboris.com\/wp-content\/uploads\/2023\/07\/cyber-security-social-engineering-scaled.jpg","type":"image\/jpeg"}],"author":"Helen Jones","twitter_card":"summary_large_image","twitter_creator":"@helen.jones@collaboris.co.uk","twitter_site":"@Collaboris","twitter_misc":{"Written by":"Helen Jones","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-engineering\/#article","isPartOf":{"@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-engineering\/"},"author":{"name":"Helen Jones","@id":"https:\/\/www.collaboris.com\/#\/schema\/person\/df8a602d5db57fce86940a1aa6385aef"},"headline":"Cybersecurity best practices : Social engineering","datePublished":"2023-07-04T12:12:47+00:00","dateModified":"2023-08-03T12:09:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-engineering\/"},"wordCount":867,"publisher":{"@id":"https:\/\/www.collaboris.com\/#organization"},"image":{"@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-engineering\/#primaryimage"},"thumbnailUrl":"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg","articleSection":["Policy Management"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-engineering\/","url":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-engineering\/","name":"Cybersecurity best practices : Social engineering","isPartOf":{"@id":"https:\/\/www.collaboris.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-engineering\/#primaryimage"},"image":{"@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-engineering\/#primaryimage"},"thumbnailUrl":"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg","datePublished":"2023-07-04T12:12:47+00:00","dateModified":"2023-08-03T12:09:28+00:00","description":"Social engineering is the use of psychological manipulation to trick people into divulging sensitive information.","breadcrumb":{"@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-engineering\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-engineering\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-engineering\/#primaryimage","url":"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg","contentUrl":"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg","width":820,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-engineering\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.collaboris.com\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity best practices : Social engineering"}]},{"@type":"WebSite","@id":"https:\/\/www.collaboris.com\/#website","url":"https:\/\/www.collaboris.com\/","name":"Collaboris","description":"We make compliance simple","publisher":{"@id":"https:\/\/www.collaboris.com\/#organization"},"alternateName":"DocRead","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.collaboris.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.collaboris.com\/#organization","name":"Collaboris","alternateName":"DocRead","url":"https:\/\/www.collaboris.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.collaboris.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.collaboris.com\/wp-content\/uploads\/2021\/05\/collaboris_logo_small.png","contentUrl":"https:\/\/www.collaboris.com\/wp-content\/uploads\/2021\/05\/collaboris_logo_small.png","width":150,"height":40,"caption":"Collaboris"},"image":{"@id":"https:\/\/www.collaboris.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Collaboris\/","https:\/\/x.com\/Collaboris","https:\/\/www.linkedin.com\/company\/collaboris"],"description":"Collaboris is a Software company that created a policy management tool called DocRead.","email":"info@collaboris.com","telephone":"02079935140","legalName":"Collaboris Ltd","foundingDate":"2007-12-03","vatID":"GB928895360","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"1","maxValue":"10"}},{"@type":"Person","@id":"https:\/\/www.collaboris.com\/#\/schema\/person\/df8a602d5db57fce86940a1aa6385aef","name":"Helen Jones","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.collaboris.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cb6011a4dfb291a2bb0e30fb70581537bb77c6e70a1c8e887e16ae98fc5b518d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cb6011a4dfb291a2bb0e30fb70581537bb77c6e70a1c8e887e16ae98fc5b518d?s=96&d=mm&r=g","caption":"Helen Jones"},"sameAs":["https:\/\/x.com\/helen.jones@collaboris.co.uk"],"url":"https:\/\/www.collaboris.com\/author\/helen-jones\/"}]}},"modified_by":"Helen Jones","_links":{"self":[{"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/posts\/1374938","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/comments?post=1374938"}],"version-history":[{"count":19,"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/posts\/1374938\/revisions"}],"predecessor-version":[{"id":1375188,"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/posts\/1374938\/revisions\/1375188"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/media\/2109"}],"wp:attachment":[{"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/media?parent=1374938"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/categories?post=1374938"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/tags?post=1374938"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}