Cybersecurity Basics·March 24, 2026·5 min read

Imagine a scenario: a company has spent millions on cybersecurity infrastructure — firewalls, intrusion detection systems, endpoint protection, encrypted communications. Then an attacker calls a member of staff, claims to be from the IT department, says there is an urgent problem with their account, and asks them to confirm their password to verify their identity. The staff member, trying to be helpful and not wanting to cause a delay, provides it. The entire security infrastructure is bypassed in a single phone call.

This is social engineering — the manipulation of people rather than systems — and it underlies the majority of significant cyberattacks. It works because human beings are wired to be helpful, to respond to authority, to act quickly under urgency, and to extend trust to people who appear credible. These are not weaknesses to be ashamed of. They are fundamental human traits that attackers have learned to exploit systematically.

What social engineering actually means

Social engineering, in the cybersecurity context, refers to any technique that manipulates a person into taking an action or revealing information that compromises security. The defining characteristic is that it targets human psychology rather than technical vulnerabilities. It does not require any hacking skill in the traditional sense — it requires an understanding of how people think and behave, and the willingness to exploit that understanding.

Social engineering attacks range in sophistication from mass-distributed generic phishing emails targeting thousands of people simultaneously, to highly targeted “spear phishing” attacks built using detailed research about a specific individual, to in-person manipulation, to phone-based vishing attacks that can be extraordinarily convincing.

The main types of social engineering attacks

Phishing is the most prevalent form — fraudulent emails impersonating trusted organisations to steal credentials or deliver malware. Modern phishing emails can be extremely convincing, using accurate logos, matched formatting, legitimate-looking domain names, and personalised content drawn from publicly available information about the target.

Spear phishing is phishing with a specific individual target. The attacker researches their target — through LinkedIn, social media, company websites, and previously leaked data — and crafts an email tailored to that specific person. A message that references your job title, your manager’s name, a project you are working on, or a recent event you attended is far more likely to deceive you than a generic template.

Vishing is voice phishing — phone calls impersonating banks, technical support, HMRC, the police, or other authorities. Vishing attacks can be extremely sophisticated, using background noise that sounds like a call centre, having access to some of your real account information to establish credibility, and using professional-sounding scripts. In recent years, AI voice cloning has made it possible to impersonate specific people convincingly using only a few seconds of audio.

Pretexting involves constructing a fabricated scenario — a pretext — to justify a request for information or access. A common example is calling a company’s IT helpdesk and claiming to be a new employee who has forgotten their login, or calling a staff member and claiming to be an auditor who needs access to certain records for a regulatory review.

Business Email Compromise (BEC) is one of the most financially damaging forms of social engineering. Attackers impersonate executives — through email spoofing or by compromising an executive’s email account — and instruct finance staff to make urgent wire transfers to accounts controlled by the attacker. BEC attacks have cost organisations worldwide billions of pounds annually.

Baiting exploits curiosity. The classic example is leaving USB drives labelled “Salary Review 2024” or “Confidential — Board Documents” in a company car park. A curious employee plugs one in and installs malware without realising it. Baiting can also occur online through enticing download links or offers that seem too good to refuse.

The psychological principles attackers exploit

Social engineers do not succeed by accident. They exploit well-documented principles of human psychology that influence behaviour in predictable ways.

Authority: We are conditioned from childhood to comply with authority figures. An attacker who convincingly presents as a bank security officer, a police detective, a company executive, or an HMRC inspector leverages this deep-seated tendency. We lower our guard and follow instructions from apparent authority without the scrutiny we would apply to a peer.

Urgency and scarcity: When we believe we need to act immediately or face serious consequences, our critical thinking is impaired. “Your account will be permanently closed in 24 hours”, “Act now before this offer expires”, “This is your only chance to resolve this without legal action” — all of these create artificial urgency that is designed to stop you thinking carefully and make you act impulsively.

Social proof: We look to others’ behaviour to guide our own, particularly in uncertain situations. Attackers exploit this through fake reviews, fabricated testimonials, and claims that “all your colleagues have already verified their accounts”.

Helpfulness and reciprocity: Most people have a strong instinct to be helpful, especially to someone who appears to be in difficulty or who has done something nice for them. Attackers exploit this by presenting themselves as needing help, or by offering something small before making a larger request.

Fear and intimidation: Threats of legal action, arrest, account closure, or financial penalties create an emotional state in which people are more likely to comply with demands without verification.

How to make yourself immune to social engineering

There is one habit that, if practised consistently, provides effective protection against the overwhelming majority of social engineering attacks: always verify independently before complying with any unexpected request involving sensitive information, financial transactions, or access credentials.

This means: if you receive a phone call from someone claiming to be from your bank, hang up and call the number on the back of your card. If you receive an email from your “CEO” asking you to make an urgent transfer, call your CEO directly on their known mobile number to confirm. If someone at the door says they are from your energy company, call the company’s customer service line before letting them in.

  • Slow down when you feel pressured to act quickly — urgency is the primary manipulation tool
  • Verify the identity of anyone requesting sensitive information through a channel you initiate independently
  • Never provide passwords, PINs, or two-factor authentication codes to anyone who contacts you, regardless of who they claim to be
  • Be suspicious of any request that asks you to bypass normal procedures “just this once”
  • Trust the feeling that something is slightly off — that instinct is often correct
  • Check the sender’s actual email address, not just the display name
The most important principle: Legitimate organisations never create genuine urgency that prevents you from verifying their identity. If anyone is pressuring you to act immediately without time to verify, that pressure itself is evidence of an attack.
Share this article: 𝕏 Twitter Facebook LinkedIn WhatsApp
📬
Get weekly security tipsPlain English. No jargon. No spam. Unsubscribe anytime.
Subscribe Free →
🛡️
MyTechGuard Team
Cybersecurity Writers & Researchers

We translate complex cybersecurity topics into plain English so everyday people can protect themselves online — no technical background required.

🍪 We use cookies to improve your experience and serve relevant ads. Privacy Policy