{"id":6622,"date":"2024-09-04T07:10:04","date_gmt":"2024-09-04T07:10:04","guid":{"rendered":"https:\/\/cobweb.com\/ae\/?p=6622"},"modified":"2024-09-04T07:27:14","modified_gmt":"2024-09-04T07:27:14","slug":"hacking-humans-how-to-protect-against-social-engineering-attacks","status":"publish","type":"post","link":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/hacking-humans-how-to-protect-against-social-engineering-attacks\/","title":{"rendered":"Hacking Humans: How to Protect Against Social Engineering Attacks"},"content":{"rendered":"\n<div class=\"wp-block-cover has-white-color has-text-color has-small-font-size wp-duotone-000000-ffffff-1\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-cobweb-teal-background-color has-background-dim-0 has-background-dim\"><\/span><img loading=\"lazy\" decoding=\"async\" width=\"1921\" height=\"561\" class=\"wp-block-cover__image-background wp-image-1664\" alt=\"\" src=\"https:\/\/cobweb.com\/ae\/wp-content\/uploads\/2022\/07\/Teal-Lined-Circle-Background.png\" style=\"object-position:83% 48%\" data-object-fit=\"cover\" data-object-position=\"83% 48%\" srcset=\"https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2022\/07\/Teal-Lined-Circle-Background.png 1921w, https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2022\/07\/Teal-Lined-Circle-Background-300x88.png 300w, https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2022\/07\/Teal-Lined-Circle-Background-1024x299.png 1024w, https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2022\/07\/Teal-Lined-Circle-Background-768x224.png 768w, https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2022\/07\/Teal-Lined-Circle-Background-1536x449.png 1536w\" sizes=\"auto, (max-width: 1921px) 100vw, 1921px\" \/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<div class=\"wp-block-columns are-vertically-aligned-top has-white-color has-cobweb-dark-teal-background-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<h1 class=\"wp-block-heading has-text-align-center has-white-color has-text-color\" style=\"font-size:60px\"><strong><strong><strong><strong><strong>Hacking Humans: How to Protect Against<br>Social Engineering Attacks<\/strong><\/strong><\/strong><\/strong><\/strong><\/h1>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<section id='content-container-block_639514cd5c86e58f73e0f1e96b9dac3a' class='content-container pt-none pb-none' style=\"background-color: #def3f5;\">\n\t\t<div class=\"full-width\">\n\t\n\t\t\t    \t\n\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"yoast-breadcrumbs\"><span><span><a href=\"https:\/\/cobweb.com\/ae\/\">Home<\/a><\/span> \u00bb <span class=\"breadcrumb_last\" aria-current=\"page\">Hacking Humans: How to Protect Against Social Engineering Attacks<\/span><\/span><\/div><\/div>\n<\/div>\n\n\n\t\t\t\t<\/div>\n\n\t\t<\/div>\n<\/section>\n\n\n<section id='post-info-block_2b9b0204ad41da3014e762c16760d1e0' class='post-info'>\n    <div class=\"grid-container\">\n    \t<div class=\"grid-x\">\n    \t\t<div class=\"small-12 medium-12 large-12 cell\">\n    \t\t\t<div class=\"post-info-container\">\n\t    \t\t\t\t    \t\t\t<div class=\"post-info-author\">\n\t    \t\t\t\t<p class=\"post-info-title\">Written By<\/p>\n\t    \t\t\t\t<p class=\"post-info-detail\">\n\t    \t\t\t\t\tAnne Aketch\t    \t\t\t\t\t\t    \t\t\t\t\t\t<a href=\"https:\/\/www.linkedin.com\/in\/anne-aketch-9b340547\/\">\n\t    \t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M416 32H31.9C14.3 32 0 46.5 0 64.3v383.4C0 465.5 14.3 480 31.9 480H416c17.6 0 32-14.5 32-32.3V64.3c0-17.8-14.4-32.3-32-32.3zM135.4 416H69V202.2h66.5V416zm-33.2-243c-21.3 0-38.5-17.3-38.5-38.5S80.9 96 102.2 96c21.2 0 38.5 17.3 38.5 38.5 0 21.3-17.2 38.5-38.5 38.5zm282.1 243h-66.4V312c0-24.8-.5-56.7-34.5-56.7-34.6 0-39.9 27-39.9 54.9V416h-66.4V202.2h63.7v29.2h.9c8.9-16.8 30.6-34.5 62.9-34.5 67.2 0 79.7 44.3 79.7 101.9V416z\"\/><\/svg>\n\t    \t\t\t\t\t\t<\/a>\n\t    \t\t\t\t\t\t    \t\t\t\t<\/p>\n\t    \t\t\t<\/div>\n\t    \t\t\t<div class=\"post-info-date\">\n\t    \t\t\t\t<p class=\"post-info-title\">Publish Date<\/p>\n\t    \t\t\t\t<p class=\"post-info-detail\">\n\t    \t\t\t\t\t04\/09\/2024\t    \t\t\t\t<\/p>\n\t    \t\t\t<\/div>\n\t    \t\t\t\t    \t\t\t\t<div class=\"post-info-category\">\n\t\t    \t\t\t\t<p class=\"post-info-title\">Categories<\/p>\n\t\t    \t\t\t\t<p class=\"post-info-categories\">\n\t\t    \t\t\t\t\t\t\t    \t\t\t\t\t\t<span>Blogs<\/span>\t\n\t\t    \t\t\t\t\t\t\t    \t\t\t\t<\/p>\n\t\t    \t\t\t<\/div>\n\t    \t\t\t\t    \t\t<\/div>\n    \t\t<\/div>\n    \t<\/div>\n    <\/div>\n<\/section>\n\n\n\n\n<section id='content-container-block_95ac5607d345715fed69225341428981' class='content-container pt-none pb-none' style=\"background-color: #ffffff;\">\n\t\t\n\t<div class=\"grid-container\">\n\t\t<div class=\"inner-content grid-x grid-margin-x\">\n\t\t\t<div class=\"large-8 large-offset-2 cell\">\n\t\t\t    \t\n\n<p>Over time, as cybersecurity solutions have become more effective, low-effort, high-volume cyberattacks are no longer successful for bad actors. In 2021, Microsoft was able to block over <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/05\/09\/building-a-safer-world-together-with-our-partners-introducing-microsoft-security-experts\/\">9.6 billion malware threats and more than 35.7 billion phishing emails<\/a>.<\/p>\n\n\n\n<p>This increase in effectiveness is in part due to the advancements in AI technology used within modern cybersecurity solutions. This allows them to stop zero-day exploits and reduce the chance of businesses falling victim to a variety of attacks.<\/p>\n\n\n\n<p>However, as these low-effort attacks are no longer viable for cybercriminals, some have shifted their focus away from targeting technology to hacking humans. These are known as social engineering attacks. In this blog, we will explore some key social engineering tactics, find out what is at risk if your business falls victim to one of these attacks, and what steps you can take to reduce your cyber risk.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What is Social Engineering?<\/h3>\n\n\n\n<p>Social engineering attacks are a broad category of cyberattacks that include some form of psychological manipulation to trick employees into sharing confidential or sensitive information. These attacks rely on human interaction and can be conducted via email, phone call, SMS, instant messaging or in-person communication.<\/p>\n\n\n\n<p>Whilst a well-crafted social engineering attack does take time and expertise, they are a common method for cybercriminals, as it is easier to exploit vulnerabilities within humans than in software. For example, it is much easier to trick an employee into sharing their password, rather than brute forcing a password. <em>Did you know that an 8-character password has over six quadrillion possible combinations?<\/em><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Social Engineering Tactics<\/h3>\n\n\n\n<p>The first stage of any social engineering attack is <strong>investigation<\/strong>. In order to craft an attack, the bad actor needs to have an understanding of the target organisation and employee. This stage is also known as open-source intelligence (OSINT) gathering, as the collection of data is gathered from publicly available sources. Some of these sources include public social media accounts, Google Maps images of office spaces, company websites and viewing EXIF data from images.<\/p>\n\n\n\n<p>Once the bad actor has researched their target, the next stage begins, <strong>the hook<\/strong>. This is when the cybercriminal engages the target and starts manipulating them into forming a relationship or trusting them. A common method to develop this trust is reciprocity, whereby the bad actor gives the target some information or does a favour for them, knowing that in the future the victim will be more likely to reciprocate and share sensitive information.<\/p>\n\n\n\n<p>Once the cybercriminal has been able to expand their foothold, they can execute the <strong>attack<\/strong>. This may include a phishing attack, credential theft, planting of malware or physically entering an office space. Depending on how effective the investigation and hook were, the target may not even realise they are under attack.<\/p>\n\n\n\n<p>If this is the case, the final stage is to <strong>exit<\/strong>. This is where the cybercriminal removes traces of malware, covers their tracks and ends their relationship with the target individual.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/ae.cobweb.com\/acton\/media\/24606\/mimecast-email-security-cloud-integrated\" target=\"_blank\" rel=\"noreferrer noopener\">Sign Up for the Webinar<\/a><\/div>\n<\/div>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Real World Examples<\/h3>\n\n\n\n<p>To illustrate the potential fallout from a social engineering attack, and some of the common forms of attack, we have 3 recent examples.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">DoL Brand Impersonation<\/h3>\n\n\n\n<p>In late 2021, email security provider <a href=\"https:\/\/www.inky.com\/en\/blog\/fresh-phish-phishers-lure-victims-with-fake-invites-to-bid-on-nonexistent-federal-projects\">INKY<\/a> detected several phishing emails that were impersonating the United States Department of Labor (DoL). The phishing emails targeted stakeholders, asking them to submit a bid for a government project.<\/p>\n\n\n\n<p>In order to \u2018submit the bid\u2019 they had to open the attached PDF and click the \u2018BID\u2019 button. This took the victim to a malicious website, with the same HTML and CSS as the real DoL website. From here, they were prompted to log in with their Microsoft 365 credentials, and upon submission, the hacker was able to harvest all the credentials, without the victim even knowing.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"602\" height=\"353\" src=\"https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2024\/09\/Picture1.png\" alt=\"\" class=\"wp-image-6623\" srcset=\"https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2024\/09\/Picture1.png 602w, https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2024\/09\/Picture1-300x176.png 300w\" sizes=\"auto, (max-width: 602px) 100vw, 602px\" \/><figcaption class=\"wp-element-caption\"><em>Source: INKY<\/em><\/figcaption><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\">AI-Based Vishing Targeting UK Energy Firm<\/h3>\n\n\n\n<p>In 2019, the CEO of an unnamed UK-based energy firm was contacted by who they thought was their boss, demanding a \u20ac220,000 bank transfer to a Hungarian supplier. The call did not raise suspicion for the CEO, as the person on the other end of the phone had the same accent and intonation as his German boss. However, this was not the case, as it is believed that the voice on the other end of the phone was an <a href=\"https:\/\/www.wsj.com\/articles\/fraudsters-use-ai-to-mimic-ceos-voice-in-unusual-cybercrime-case-11567157402\">AI-based voice generation software<\/a>.<\/p>\n\n\n\n<p>The attack was successful, and the money was transferred to a fraudulent account. This is a prime example of a novel social engineering attack, as it was only successful as the attacker had previously researched the victim, and crafted the attack to manipulate the CEO.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Business Email Compromise Costing Facebook and Google $100 Million<\/h3>\n\n\n\n<p>A few years ago, a Lithuanian man crafted <a href=\"https:\/\/www.justice.gov\/usao-sdny\/pr\/lithuanian-man-pleads-guilty-wire-fraud-theft-over-100-million-fraudulent-business\">the largest social engineering attack of all time<\/a>. He created a fraudulent company, pretending to be a computer manufacturer working with Google and Facebook. He then targeted specific individuals within those two companies, invoicing them for goods and services that a real manufacturer had provided.<\/p>\n\n\n\n<p>Over 2 years, the man was able to fraudulently obtain over $100 million from Facebook and Google and was only caught 2 years after the attack.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">How to Protect Your Business<\/h3>\n\n\n\n<p>It can be difficult to protect your business against complex social engineering attacks, especially as security solutions cannot supply 100% protection against many of the tactics used in these attacks.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.gov.uk\/government\/statistics\/cyber-security-breaches-survey-2022\/cyber-security-breaches-survey-2022\">With phishing emails being the most common form of social engineering attack<\/a>, businesses should look for a holistic email security solution. This will block potential phishing emails, protect against malicious URLs, perform file analysis on attachments, and enable DMARC.<\/p>\n\n\n\n<p>However, email security and phishing prevention will not stop vishing attacks, in-person attacks, or phishing attacks not carried out via corporate email. In order to safeguard against these attacks, businesses need to have a strong cybersecurity education and awareness training program. This will ensure that employees are aware of common social engineer attack methods, and how to detect and report them.<\/p>\n\n\n\n<p>Finally, it goes without saying that all businesses should have multifactor authentication enabled. This simple control can stop <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/08\/20\/one-simple-action-you-can-take-to-prevent-99-9-percent-of-account-attacks\/\">99.9% of account compromise attacks<\/a> and does not take long to enable. With MFA, even if an employee shares their password with a bad actor, they will not be able to log in without the additional authentication method.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">How We Can Help<\/h3>\n\n\n\n<p>For businesses without security expertise, social engineering attacks can be difficult to protect against. Especially if your business does not already have a comprehensive cybersecurity awareness training program.<\/p>\n\n\n\n<p>If you are concerned about your organisation\u2019s security posture, contact us today and we can help ensure you\u2019re doing everything you can to reduce your overall cyber risk.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-text-align-center wp-element-button\" href=\"https:\/\/ae.cobweb.com\/acton\/media\/24606\/mimecast-email-security-cloud-integrated\" target=\"_blank\" rel=\"noreferrer noopener\">Sign Up for the Webinar<\/a><\/div>\n<\/div>\n\n\n\t\t\t\t<\/div>\n\n\t\t\t\t<\/div>\n    \t<\/div>\n\t\t<\/div>\n<\/section>\n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":13,"featured_media":6624,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":"[]"},"categories":[3],"tags":[97,55,86,87],"class_list":["post-6622","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogs","tag-email","tag-it","tag-mimecast","tag-security","product_service-cyber-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hacking Humans: How to Protect Against Social Engineering Attacks - Cobweb MENA<\/title>\n<meta name=\"description\" content=\"Explore the evolution of cyberattacks in the face of advanced cybersecurity solutions. Learn how social engineering attacks exploit human vulnerabilities, the tactics cybercriminals use, and steps to protect your business from these sophisticated threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/hacking-humans-how-to-protect-against-social-engineering-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Upskill and Grow With Storyals &amp; Cobweb\" \/>\n<meta property=\"og:description\" content=\"Explore the evolution of cyberattacks in the face of advanced cybersecurity solutions. Learn how social engineering attacks exploit human vulnerabilities, the tactics cybercriminals use, and steps to protect your business from these sophisticated threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/hacking-humans-how-to-protect-against-social-engineering-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Cobweb MENA\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-04T07:10:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-04T07:27:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2024\/01\/Storyals-banner.png\" \/>\n\t<meta property=\"og:image:width\" content=\"350\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"anneaketch\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Upskill and Grow With Storyals &amp; Cobweb\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2024\/01\/Storyals-banner.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"anneaketch\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cobweb.com\\\/ae\\\/content-hub\\\/blogs\\\/hacking-humans-how-to-protect-against-social-engineering-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cobweb.com\\\/ae\\\/content-hub\\\/blogs\\\/hacking-humans-how-to-protect-against-social-engineering-attacks\\\/\"},\"author\":{\"name\":\"anneaketch\",\"@id\":\"https:\\\/\\\/cobweb.com\\\/ae\\\/#\\\/schema\\\/person\\\/6c2ffd7b3b2d31ec9788cfff95b3ac2d\"},\"headline\":\"Hacking Humans: How to Protect Against Social Engineering Attacks\",\"datePublished\":\"2024-09-04T07:10:04+00:00\",\"dateModified\":\"2024-09-04T07:27:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cobweb.com\\\/ae\\\/content-hub\\\/blogs\\\/hacking-humans-how-to-protect-against-social-engineering-attacks\\\/\"},\"wordCount\":1112,\"image\":{\"@id\":\"https:\\\/\\\/cobweb.com\\\/ae\\\/content-hub\\\/blogs\\\/hacking-humans-how-to-protect-against-social-engineering-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cobweb.com\\\/ae\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2024\\\/09\\\/Image__Hacking_Humans.jpg\",\"keywords\":[\"Email\",\"IT\",\"Mimecast\",\"Security\"],\"articleSection\":[\"Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cobweb.com\\\/ae\\\/content-hub\\\/blogs\\\/hacking-humans-how-to-protect-against-social-engineering-attacks\\\/\",\"url\":\"https:\\\/\\\/cobweb.com\\\/ae\\\/content-hub\\\/blogs\\\/hacking-humans-how-to-protect-against-social-engineering-attacks\\\/\",\"name\":\"Hacking Humans: How to Protect Against Social Engineering Attacks - Cobweb MENA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cobweb.com\\\/ae\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cobweb.com\\\/ae\\\/content-hub\\\/blogs\\\/hacking-humans-how-to-protect-against-social-engineering-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cobweb.com\\\/ae\\\/content-hub\\\/blogs\\\/hacking-humans-how-to-protect-against-social-engineering-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cobweb.com\\\/ae\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2024\\\/09\\\/Image__Hacking_Humans.jpg\",\"datePublished\":\"2024-09-04T07:10:04+00:00\",\"dateModified\":\"2024-09-04T07:27:14+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/cobweb.com\\\/ae\\\/#\\\/schema\\\/person\\\/6c2ffd7b3b2d31ec9788cfff95b3ac2d\"},\"description\":\"Explore the evolution of cyberattacks in the face of advanced cybersecurity solutions. Learn how social engineering attacks exploit human vulnerabilities, the tactics cybercriminals use, and steps to protect your business from these sophisticated threats.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cobweb.com\\\/ae\\\/content-hub\\\/blogs\\\/hacking-humans-how-to-protect-against-social-engineering-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cobweb.com\\\/ae\\\/content-hub\\\/blogs\\\/hacking-humans-how-to-protect-against-social-engineering-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cobweb.com\\\/ae\\\/content-hub\\\/blogs\\\/hacking-humans-how-to-protect-against-social-engineering-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cobweb.com\\\/ae\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2024\\\/09\\\/Image__Hacking_Humans.jpg\",\"contentUrl\":\"https:\\\/\\\/cobweb.com\\\/ae\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2024\\\/09\\\/Image__Hacking_Humans.jpg\",\"width\":2400,\"height\":1600,\"caption\":\"Mimecast Email Security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cobweb.com\\\/ae\\\/content-hub\\\/blogs\\\/hacking-humans-how-to-protect-against-social-engineering-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cobweb.com\\\/ae\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hacking Humans: How to Protect Against Social Engineering Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cobweb.com\\\/ae\\\/#website\",\"url\":\"https:\\\/\\\/cobweb.com\\\/ae\\\/\",\"name\":\"Cobweb MENA\",\"description\":\"Cobweb MENA\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cobweb.com\\\/ae\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cobweb.com\\\/ae\\\/#\\\/schema\\\/person\\\/6c2ffd7b3b2d31ec9788cfff95b3ac2d\",\"name\":\"anneaketch\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d897e1c432d77af12b1ded3b45d48b6eff9b73ba123e5a786697001465daed6b?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d897e1c432d77af12b1ded3b45d48b6eff9b73ba123e5a786697001465daed6b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d897e1c432d77af12b1ded3b45d48b6eff9b73ba123e5a786697001465daed6b?s=96&d=mm&r=g\",\"caption\":\"anneaketch\"},\"url\":\"https:\\\/\\\/cobweb.com\\\/ae\\\/content-hub\\\/author\\\/anneaketch\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hacking Humans: How to Protect Against Social Engineering Attacks - Cobweb MENA","description":"Explore the evolution of cyberattacks in the face of advanced cybersecurity solutions. Learn how social engineering attacks exploit human vulnerabilities, the tactics cybercriminals use, and steps to protect your business from these sophisticated threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/hacking-humans-how-to-protect-against-social-engineering-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Upskill and Grow With Storyals & Cobweb","og_description":"Explore the evolution of cyberattacks in the face of advanced cybersecurity solutions. Learn how social engineering attacks exploit human vulnerabilities, the tactics cybercriminals use, and steps to protect your business from these sophisticated threats.","og_url":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/hacking-humans-how-to-protect-against-social-engineering-attacks\/","og_site_name":"Cobweb MENA","article_published_time":"2024-09-04T07:10:04+00:00","article_modified_time":"2024-09-04T07:27:14+00:00","og_image":[{"width":350,"height":300,"url":"https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2024\/01\/Storyals-banner.png","type":"image\/png"}],"author":"anneaketch","twitter_card":"summary_large_image","twitter_title":"Upskill and Grow With Storyals & Cobweb","twitter_image":"https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2024\/01\/Storyals-banner.png","twitter_misc":{"Written by":"anneaketch","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/hacking-humans-how-to-protect-against-social-engineering-attacks\/#article","isPartOf":{"@id":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/hacking-humans-how-to-protect-against-social-engineering-attacks\/"},"author":{"name":"anneaketch","@id":"https:\/\/cobweb.com\/ae\/#\/schema\/person\/6c2ffd7b3b2d31ec9788cfff95b3ac2d"},"headline":"Hacking Humans: How to Protect Against Social Engineering Attacks","datePublished":"2024-09-04T07:10:04+00:00","dateModified":"2024-09-04T07:27:14+00:00","mainEntityOfPage":{"@id":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/hacking-humans-how-to-protect-against-social-engineering-attacks\/"},"wordCount":1112,"image":{"@id":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/hacking-humans-how-to-protect-against-social-engineering-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2024\/09\/Image__Hacking_Humans.jpg","keywords":["Email","IT","Mimecast","Security"],"articleSection":["Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/hacking-humans-how-to-protect-against-social-engineering-attacks\/","url":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/hacking-humans-how-to-protect-against-social-engineering-attacks\/","name":"Hacking Humans: How to Protect Against Social Engineering Attacks - Cobweb MENA","isPartOf":{"@id":"https:\/\/cobweb.com\/ae\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/hacking-humans-how-to-protect-against-social-engineering-attacks\/#primaryimage"},"image":{"@id":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/hacking-humans-how-to-protect-against-social-engineering-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2024\/09\/Image__Hacking_Humans.jpg","datePublished":"2024-09-04T07:10:04+00:00","dateModified":"2024-09-04T07:27:14+00:00","author":{"@id":"https:\/\/cobweb.com\/ae\/#\/schema\/person\/6c2ffd7b3b2d31ec9788cfff95b3ac2d"},"description":"Explore the evolution of cyberattacks in the face of advanced cybersecurity solutions. Learn how social engineering attacks exploit human vulnerabilities, the tactics cybercriminals use, and steps to protect your business from these sophisticated threats.","breadcrumb":{"@id":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/hacking-humans-how-to-protect-against-social-engineering-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cobweb.com\/ae\/content-hub\/blogs\/hacking-humans-how-to-protect-against-social-engineering-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/hacking-humans-how-to-protect-against-social-engineering-attacks\/#primaryimage","url":"https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2024\/09\/Image__Hacking_Humans.jpg","contentUrl":"https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2024\/09\/Image__Hacking_Humans.jpg","width":2400,"height":1600,"caption":"Mimecast Email Security"},{"@type":"BreadcrumbList","@id":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/hacking-humans-how-to-protect-against-social-engineering-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cobweb.com\/ae\/"},{"@type":"ListItem","position":2,"name":"Hacking Humans: How to Protect Against Social Engineering Attacks"}]},{"@type":"WebSite","@id":"https:\/\/cobweb.com\/ae\/#website","url":"https:\/\/cobweb.com\/ae\/","name":"Cobweb MENA","description":"Cobweb MENA","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cobweb.com\/ae\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/cobweb.com\/ae\/#\/schema\/person\/6c2ffd7b3b2d31ec9788cfff95b3ac2d","name":"anneaketch","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d897e1c432d77af12b1ded3b45d48b6eff9b73ba123e5a786697001465daed6b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d897e1c432d77af12b1ded3b45d48b6eff9b73ba123e5a786697001465daed6b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d897e1c432d77af12b1ded3b45d48b6eff9b73ba123e5a786697001465daed6b?s=96&d=mm&r=g","caption":"anneaketch"},"url":"https:\/\/cobweb.com\/ae\/content-hub\/author\/anneaketch\/"}]}},"_links":{"self":[{"href":"https:\/\/cobweb.com\/ae\/wp-json\/wp\/v2\/posts\/6622","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cobweb.com\/ae\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cobweb.com\/ae\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cobweb.com\/ae\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/cobweb.com\/ae\/wp-json\/wp\/v2\/comments?post=6622"}],"version-history":[{"count":1,"href":"https:\/\/cobweb.com\/ae\/wp-json\/wp\/v2\/posts\/6622\/revisions"}],"predecessor-version":[{"id":6625,"href":"https:\/\/cobweb.com\/ae\/wp-json\/wp\/v2\/posts\/6622\/revisions\/6625"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cobweb.com\/ae\/wp-json\/wp\/v2\/media\/6624"}],"wp:attachment":[{"href":"https:\/\/cobweb.com\/ae\/wp-json\/wp\/v2\/media?parent=6622"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cobweb.com\/ae\/wp-json\/wp\/v2\/categories?post=6622"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cobweb.com\/ae\/wp-json\/wp\/v2\/tags?post=6622"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}