RSA 2026Come see what your attackers already know→
GhostEye
PLATFORMCOMPANYRESOURCES
SCHEDULE DEMO

Find out who in your company is exposed.

PLATFORM

Overview

RESOURCES

BlogResearchEventsNewsProductGlossary

COMPANY

About
GhostEye
22 Vanderbilt Suite 7C
New York, NY 10017
founders@ghosteye.ai
Trust CenterHelp CenterSchedule DemoTerms of UsePrivacy Policy

© 2026 GhostEye, Inc. All rights reserved.

  1. ← Glossary
  2. /
  3. Social Engineering

Social Engineering

ATTACK TYPES
·2 min read·Updated Mar 2026

Social engineering is the practice of manipulating people into performing actions or divulging confidential information that compromises organizational security. Rather than exploiting software vulnerabilities, social engineering exploits human psychology: trust, fear, urgency, curiosity, and helpfulness..

What is Social Engineering?

Social engineering is the practice of manipulating people into performing actions or divulging confidential information that compromises organizational security. Rather than exploiting software vulnerabilities, social engineering exploits human psychology: trust, fear, urgency, curiosity, and helpfulness.

How Social Engineering Works

All social engineering follows a pattern: research the target, establish trust or create urgency, exploit the emotional response, and extract the desired outcome. Attackers may impersonate colleagues, IT support, vendors, or authority figures. They may call, email, text, or show up in person. The common thread is that the attack targets the person, not the technology.

Why Social Engineering Matters

Social engineering is involved in 70-90% of all successful cyberattacks according to KnowBe4. The Verizon DBIR consistently finds the human element in roughly three-quarters of breaches. Despite billions spent on technical security controls, social engineering remains the most reliable way into any organization because it bypasses firewalls, endpoint detection, and encryption entirely.

Types of Social Engineering

  • Phishing: Fraudulent emails designed to steal credentials or deliver malware
  • Vishing: Phone-based manipulation using impersonation and urgency
  • Smishing: SMS-based attacks with malicious links
  • Pretexting: Creating a fabricated scenario to extract information
  • Baiting: Offering something enticing (USB drive, free download) to deliver malware
  • Tailgating: Physically following an authorized person into a restricted area
  • Help desk attacks: Calling IT support while impersonating an employee

How to Protect Against Social Engineering

  • Test employees across all channels: email, voice, SMS, and help desk
  • Monitor the public information attackers use to build social engineering campaigns
  • Train employees on the psychological triggers attackers exploit (urgency, authority, fear)
  • Establish verification protocols for sensitive requests
  • Build a culture where questioning unusual requests is encouraged, not punished
On this pageWhat is Social Engineering?How Social Engineering WorksWhy Social Engineering MattersTypes of Social EngineeringHow to Protect Against Social EngineeringFAQ

Frequently Asked Questions

What is the most common type of social engineering attack?

Phishing is the most common form of social engineering, accounting for the majority of initial access in data breaches. It uses fraudulent emails to trick people into clicking malicious links or revealing credentials.

How can organizations protect against social engineering?

Organizations should combine multi-channel attack simulations (email, voice, SMS, help desk), employee exposure monitoring, verification protocols for sensitive requests, and a culture that encourages questioning unusual requests.

Why does social engineering bypass technical security controls?

Social engineering targets human psychology rather than software vulnerabilities. Firewalls, endpoint detection, and encryption protect against technical exploits but cannot prevent an employee from voluntarily sharing credentials or approving a fraudulent request.

What percentage of cyberattacks involve social engineering?

According to KnowBe4, social engineering is involved in 70-90% of all successful cyberattacks. The Verizon DBIR consistently finds the human element in roughly three-quarters of breaches.

Related Terms
PhishingVishingPretextingImpersonationHuman Attack Surface