Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

How can companies keep up with social engineering attacks?

By Gary Orenstein
hacker

Image from Pixabay

September 6, 2022

Every year, social engineering attacks are employing more advanced techniques. Technology continues its inexorable march forward, and its advancement in areas such as artificial intelligence (AI) and machine learning — deepfake technology, for example — will further exacerbate social engineering risks.

Social engineering can be defined as the psychological strategies scammers use to manipulate humans into clicking on compromised links or divulging sensitive information. Social engineering comes in many forms, including emails, phone calls and texting. These attacks exploit users’ fears, curiosity or helpfulness to trick individuals into sharing data such as login credentials, bank accounts or social security numbers. Commonly, they’ll redirect victims to websites harboring drive-by malware downloads and initiate phishing attacks.

Phishing schemes are often quite sophisticated. In the fall of 2020, guests at the Ritz Hotel in London were “vished” (voice call phishing) by scammers posing as Ritz staff. The scammers convinced guests to divulge credit card information. According to Bitwarden research, emails purporting to be from financial institutions (35%) or a government entity (22%) were the top phishing culprits of 2021.

With the increase in digital and remote work, phishing driven by social engineering has reached the point where staying safe remains a priority for both individuals and enterprises, as phished employees can compromise an organization’s network.

Focus on cybersecurity fundamentals

When it comes to online safety, basic internet security protocols can help prevent phishing. Increased vigilance is warranted — 83% of organizations said they experienced a successful email-based phishing attack in 2021, versus 57% in 2020. That’s an astronomical increase.

To start, check all aspects of the email to confirm it is from the proper institution. This includes looking at the email sender name and the accompanying email address. It’s important to learn the difference between a displayed email address and the real one, since email addresses can be spoofed and misleading. Also, mobile phones do not always show the full sender’s email address, whereas browsers and applications for desktops and laptops often show more information.

Hover over links to confirm they go to the proper website, and, in general, avoid clicking on links since they can be designed to trick users. If you are concerned about the message in the email, it is always better to log directly into the account in question and avoid any information sent to you via a suspicious email.

Do not open attachments from people you don’t know — or unexpected attachments from people you do know without checking first. It is possible that their email accounts may have been compromised in a separate phishing attack.

While these recommendations generally apply to online scams, the principles behind them can also apply to vishing and text-based scams. Be skeptical and ask a lot of questions if something doesn’t feel right. Hang up on the person you find questionable and directly call the organization they claim to be representing. Being asked to divulge sensitive financial information multiple times isn’t normal. Listen to your instincts.

Tools to keep enterprise networks safer

The best practices outlined above set the foundation for protecting enterprise networks from phishing. Going a step beyond the fundamentals can further boost enterprise cybersecurity.

  • Use a password manager: Password managers allow users to create and manage login credentials for each website to reduce the impact of potential data breach. If it happens, only a single password is compromised, and users can quickly generate a new one.
  • Enable two-factor authentication: Two-factor authentication is a first line of defense against hackers trying to gain credentials.
  • Consider privacy-centric browsers and search engines: Research and prioritize those not owned by large technology companies.
  • Use encrypted messaging and email: If you are sharing any sensitive information, use an encrypted messaging or email program.

If an employee falls victim to a phishing attack, it is worthwhile to lodge a complaint with the Federal Bureau of Investigation (FBI)'s Internet Crime Complaint Center (IC3). Enterprise organizations can also keep their employees by employing cybersecurity tactics like simulated phishing attacks and instituting cyber education programs.

Social engineering-centric cyber criminals are savvy. With these tips, businesses can be too.

KEYWORDS: cyber security awareness deepfakes fraud prevention multi-factor authentication password management phishing

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Gary orenstein%5b1%5d

Gary Orenstein is Chief Customer Officer at Bitwarden, leading the go-to-market efforts across customer success, marketing and sales.

Before Bitwarden, Orenstein served in executive marketing and product roles at enterprise infrastructure companies Yellowbrick Data and MemSQL, as well as flash memory pioneer Fusion-io, which went public during his tenure there. Earlier in his career, he led marketing at Compellent, which after its IPO was acquired by Dell.

Orenstein holds a Bachelor’s degree from Dartmouth College and a Master’s in business administration from The Wharton School at the University of Pennsylvania.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Cybersecurity Leadership Images

    Q&A: How Can SMBs Keep Up with Cybersecurity Risks?

    See More
  • Human hand and robot hand

    AI vs AI: In the age of AI-driven attacks, only AI can keep up

    See More
  • threat

    How security teams can combat social engineering and insider threats

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 9781138378339.jpg

    Surveillance, Crime and Social Control

  • Optimizing Social Media from a B2B Perspective

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing