Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsLogical SecuritySecurity & Business Resilience

Preparing employees to win the battle against social engineering

By Max Shier
red and green lighting over three unlocked locks

Image via Unsplash

March 3, 2023

Despite high-profile ransomware, nation-state and supply chain attacks dominating headlines over the past few years, social engineering — and phishing, in particular — remains the top cause of data breaches. In fact, according to CISCO’s 2021 Cyber Security Threat Trends report, about 90% of data breaches occur due to phishing. 

Social engineering attacks are designed to trick, deceive or psychologically manipulate targets into divulging sensitive information, disclosing account information or performing an action, such as sending the attacker money. Bad actors typically exploit current events and invoke tones of fear and urgency to incite the victim to act on their behalf. For example, during the start of the COVID-19 pandemic, security leaders saw a range of social engineering threats — from emails claiming fake news and cures to those asking for donations to fraudulent charities. 

Here are a few of the most common types of social engineering threats:

Phishing: Email-based attacks where the fraudulent sender impersonates a legitimate person (such as a boss, family member or friend) or organization (such as a bank or charity) to gain the victim’s trust and get them to act or divulge confidential information.

Vishing: Phishing attacks that occur over the phone, rather than through email.

Smishing: Phishing attacks that occur through text messages.

Spear phishing: Phishing attacks that target a specific person, group, business or organization.

Social engineering attacks have become increasingly sophisticated over the past few years, not only in the way bad actors craft their content, but also in how they trick victims. Many phishing and smishing attacks now include malicious links or attachments that, when clicked or opened, download malware onto the victim’s connected device. When this happens, the bad actor doesn’t need the target’s help — they can steal information and money on their own. Making matters worse, once the victim’s connected device is compromised, it opens a gateway onto their company network — enabling attackers to move laterally throughout the organization, inflicting damage at every turn.

The solution to social engineering

Social engineering attacks have been around for decades, but their success rate hasn’t diminished in the slightest. This is because, despite being an old threat vector, many people still aren’t aware of social engineering threats and don’t know how to detect or defend against them. In fact, Comcast’s 2022 Xfinity Cyber Health Report revealed that 71% of survey respondents said they’ve heard of phishing, but only 39% said they’d be able to confidently explain it — which likely means the remaining 61% don’t know how to sufficiently identify or protect themselves from this threat.

Knowing this, it seems like the solution to the social engineering problem should be simple: prioritizing employee education, awareness and training. And yet, many companies continue to falter in this regard. 

Building a security culture 

To truly mitigate the risks associated with social engineering — and all threat vectors, for that matter — companies need to build a security culture with employee awareness, education and training at the center. This means moving beyond the once or twice a year check-the-box training sessions and instead ensuring cybersecurity is always present by making it a  fundamental part of business operations and providing continuous learning opportunities for employees. The goal is to have cyber safe behavior become automatic, rather than something employees must stop and think about. 

Building a security culture in this way isn’t easy, and it may take some time, but it’s worth all the hard work. 

Ensure employee education, awareness and training programs are frequent and engaging: Long, cookie-cutter training programs will leave employees bored and distracted, causing them to forget what they learned within a few weeks. Getting creative and making content humorous can engage employees and help them remember important best practices. When it comes to cadence, short and more frequent training will be much more impactful than conducting one or two long sessions each year.

Reward cyber safe behavior: An effective way to promote adoption of safe cybersecurity behavior and boost employee engagement is to implement recognition and reward programs — for example, running monthly contests or rolling out gamification programs. 

Make reporting fast and easy: If an employee detects a threat, it’s a significant step in the right direction. But the true win will be getting them to go one step further and reporting the suspected threat, so, if validated, the security team can notify the entire employee base to prevent others from taking the bait. To incentivize employees to take this action, though, the reporting process must be simple and quick — for example, adding a “one-click” link to an email platform that allows users to forward suspicious emails directly to the security team for review. 

Involve the whole company: Building a strong cybersecurity culture demands a firm commitment from all levels of the organization — from the board and C-suite executives to the mailroom. Regardless of position, each employee needs to understand why good cyber hygiene is so important as well as their specific role in protecting the company from cyber threats. 

Employees are the first line of defense against these — and all — attacks. Building a security culture that has employee awareness, education and training at the center is a great start.

This article originally ran in Today’s Cybersecurity Leader, a monthly cybersecurity-focused eNewsletter for security end users, brought to you by Security magazine. Subscribe here.

KEYWORDS: employee training malware phishing social engineering workplace culture

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Max Shier is CISO at Optiv

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • hacker ransomware

    14 ways to win the war against ransomware

    See More
  • computer open to gmail

    Guarding against social engineering attacks

    See More
  • social engineering attacks and how to thwart them

    Avoid social engineering attacks and protect employees

    See More

Related Products

See More Products
  • 9781138378339.jpg

    Surveillance, Crime and Social Control

  • Optimizing Social Media from a B2B Perspective

  • The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing