How Can a Business Protect Itself From Social Engineering Attacks?

How Can a Business Protect Itself From Social Engineering Attacks?

Technology is not isolated from its human operators. Employees and others must use technology interfaces to work, communicate, and carry out daily tasks. It is this interface that cybercriminals increasingly exploit to initiate successful cyberattacks. As such, circumvention of security has focused on manipulating the human element when using apps and other IT resources. Evidence of this shift can be seen in research from Verizon. The Verizon 2024 Data Breach Investigations Report (DBIR) found that over two-thirds (68%) of cyberattacks involved a human being, and an SMB is in the cross-hairs of this insidious form of attack.

Understanding why cybercriminals have focused on human operators and how they exploit employees to carry out tasks that harm a company allows an organization to implement robust measures. Here, we discuss protecting your employees and company from social engineering attacks.

What is Social Engineering?

What is Social Engineering?

Social engineering describes various methods cybercriminals use to manipulate human behavior to extract sensitive data, steal money, and cause damage. This involves using psychological tactics like exploiting trust. This type of social engineering is nothing new. Criminals of old would use the same sort of manipulative methods to steal money from unsuspecting citizens. However, since the advent of computing, social engineering has taken a digital pathway. Today, social engineering is carried out using any digital method available, including email, text messages, social media, mobile device apps, and Generative AI.

Social engineering is often part of a complex cyberattack chain that may include phishing, vulnerability exploitation, and malware infections. This "kill chain" uses the human target to perform actions that benefit the cybercriminal, like transferring company funds to a hacker's bank account.

Social engineering as a cybercrime tactic is popular amongst cybercriminals. According to a 2025 World Economic Forum report, 42% of organizations suffered from a successful social engineering attack. The report expects this to increase with AI-assisted social engineering. The report's authors describe AI as the next big challenging security, stating that "Generative AI is augmenting cybercriminal capabilities, contributing to an uptick in social engineering attacks". The report also notes that "GenAI tools are lowering the cost of the phishing and social engineering campaigns that give attackers access to organizations".

Socially engineered cyberattacks cost businesses large sums: The average cost of a social engineering attack is around $130,000.

Unfortunately, small to medium-sized businesses (SMBs) are at greater risk of social engineering attacks.

Average Number of Social Engineering Attacks Per Mailbox

Source: Barracuda

Why are Small Businesses Susceptible to Social Engineering Attacks?

Why are Small Businesses Susceptible to Social Engineering Attacks?

The reasons why an SMB is most susceptible to social engineering attacks are various, but the following are the most pressing:

  • Lack of robust defenses: An SMB is less likely to have the capital or bandwidth to invest in enterprise-grade cyber defenses. However, managed service providers (MSPs) can offer state-of-the-art cybersecurity solutions, including security awareness training, that are designed for an SMB budget.
  • No access to skilled personnel: An SMB may not have the cyber skills required to manage the volume of attacks experienced by smaller organizations. An MSP can step in to fill the cyber-skills gap.
  • Need to focus on core business: An SMB must focus on its core business to maintain a competitive advantage. With fewer staff to spare, cybersecurity is seen as less important than the main operational areas.
  • Cost barrier: Costs to implement enterprise-grade security measures can be off-putting for an SMB. However, an MSP can deliver security solutions at reduced cost because of bulk purchase power through partnerships with security vendors.

Steps To a Successful Social Engineering Attack

The typical steps taken by cybercriminals to execute a social engineering-based cyberattack are as follows:

Identify Target

Targeted attacks are becoming increasingly likely at an SMB. Generative AI is used to identify susceptible targets and help design effective social engineering attacks against a target.

Deception Delivery

Using the intelligence gathered during target identification, the cybercriminal creates a social engineering scam. This will use psychological techniques like exploiting trust or encouraging a fear of missing out to manipulate the target into performing a task that benefits the attacker.

Exploitation and Scam Execution

The attack is executed once the target performs the task. This could be entering login credentials or other data into a spoof website, unwittingly sending money to a hacker's bank account, or installing malware like ransomware.

Shutting the Door

Once the attacker has what they want, they will stop the attack and attempt to ensure that there is no way of tracing them.

Types of Social Engineering Attacks

Of the myriad of social engineering-initiated cyberattacks, the following are the most common:

Scams

Scams

A scam is an umbrella term covering various ruses involving social engineering. Examples include romance or tax scams. Scams rely on building trust with the target. This can take time as the scammer will focus on creating a relationship with the target. Once the scammer has the target's trust, they will carry out the scam, for example, asking for a payment.

Phishing (including smishing, vishing, and quishing)

Social engineering is most famous for being an integral part of phishing success. Phishing messages are delivered using several channels, including emails, SMS text messages (smishing), and telephone calls (vishing). Phishing attackers will utilize trust in the same ways as general scammers. For example, QR code phishing (quishing) uses a QR code in a phishing message because people are used to using QR codes and trust that when they click the link in the QR code, it will take them to a legitimate website.

Social engineering within phishing messages uses other psychological tactics to manipulate behavior to encourage a click on a malicious link or download an infected attachment. Tactics include exploiting a Fear of Missing Out (FOMO), wanting to do a good job, urgency and concern, and free offers. SMBs are 350% more likely to suffer from social engineering attacks.

Spear-Phishing and Whaling

The more targeted form of phishing is known as spear-phishing. Cybercriminals use intelligence-gathering methods (including generative AI) to identify targets in a company. For example, they may wish to target a system administrator to steal highly privileged login credentials or someone in accounts payable, as part of a financial scam.

Whaling attacks tend to target C-level executives. Targeted attacks are much harder to identify as rogue as they are highly personalized using the intelligence on the target.

Business Email Compromise (BEC)

Business Email Compromise has become an increasingly common form of social engineering-assisted cyber-scam. The FBI recorded $2.9 billion in financial costs to businesses from BEC scams, with the average cost to a business being $137,132.

BEC scams are heavily reliant on the manipulation of trust. The scammers will carefully set up a scenario where a person responsible for handling payments believes they are dealing with the company's CEO or CFO. This will involve either compromising the C-Level email account or creating a highly believable spoof that involves the C-Level email or other communication methods. In one example, the BEC attack involved an AI-generated voice that spoofed the CEO. The BEC attackers then contact the employee(s) handling payments, pretending to be the C-Level executive, and urgently requesting that a payment be made to a specific account (the attacker's account).

Impersonation Attacks

Posing as a trusted entity, like a partner company or C-Level executive, is part of the broad remit of an impersonation attack. Like BEC, impersonation attacks socially engineered targets using trust, FOMO, urgency, and other behavioral manipulations. An FTC 2024 report, "Impersonation scams: not what they used to be" states that half of all fraud involve impersonation attacks. Email impersonation works. A 2024 report from Egress found that almost all (94%) of organizations experienced security incidents involving impersonation attacks.

Pretexting and Tailgating

Pretexting and tailgating use more traditional low-tech tactics to manipulate employees. Typically, the scammers will pretend to be a person in authority (e.g., a tax office supervisor) or a new co-worker. Trust is again, the main driver of behavior manipulation. The chosen target is approached or contacted by the attacker using digital methods or in person. Again, the attacker may take time to build a rapport with the targeted employee. Once a relationship is established, the scammer will attempt to manipulate the individual into handing over information, such as personal data or financial details.

Tailgators manipulate employees to find ways to enter a building or restricted area. Once inside, they can use legitimate tools used by security professionals to steal data, including login credentials.

What Does a Social Engineering Attack Cost an SMB?

What Does a Social Engineering Attack Cost an SMB?

Cybercriminals use social engineering to initiate attacks by exploiting human behavior. However, the results of an attack are classic incidents, including data theft, ransomware infection, and damage to IT systems. The cost of these include the following:

The overall cost of a cybersecurity incident at an SMB is an average of US$1.6 million. (Source)

Downtime: The cost of a single hour of downtime ranges from $1,000 to over $100,000, depending on the severity of the attack and the size of the SMB. (Source)

Non-compliance fines: Fine amounts vary depending on the breach's severity, the company's size, and the regulation. As an example, GDPR fines can be up to €20 million or 4% of annual revenue, whichever is greater. (Source)

Lost business: Difficult to put a price on lost business, but cyberattacks severely impact customer trust. Research shows a third of SMBs lost customers after a data breach. (Source)

Examples of Social Engineering Attacks

Lexington City (BEC scam)

Employees received an email claiming to be from the "Community Action Council". The email requested that the council update its bank account details. This new account was the hacker's. In total, employees of Lexington City wired three bank transfers to this new account, totaling around $4 million.

United States Department of Labor (DoL)

The DoL suffered an email spoofing attack, in which the DoL domain was spoofed and Microsoft 365 login credentials were stolen. The attackers used social engineering with phishing, the emails seemed to come from a senior DoL employee. The phishing email encouraged the employee to submit a bid for a government project by clicking a link. This malicious link took the employee to a spoof M365 website. Once on the spoof site, the employees were encouraged to enter their login credentials, which would then be sent to the attacker.

Help Desk Social Engineering

Microsoft has seen an increase in social engineering attacks based on emails or SMS text messages that appear to come from Microsoft Support. The messages use the Microsoft brand to engender trust and then apply pressure in the form of something urgent, such as a possible compromise of an M365 account. SMBs are often targeted by this type of social engineering phishing scam, cybercriminals attempting to steal corporate login credentials to Microsoft apps, allowing them to steal sensitive data and financial details.

How Can an Organization Protect its Employees Against Social Engineering Attacks?

Security Awareness Training

Security Awareness Training

A Microsoft Digital Defense Report on social engineering states this:

"Regardless of the technique, social engineering remains a constant threat that ultimately cannot be fully mitigated via technology".

Social engineering is an insidious tactic because it exploits human behavior. Cybercriminals' manipulative tactics can often be hard to identify unless you know what you are looking for. This is why security awareness training is so necessary. Security awareness training packages are typically behavior-based and optimized for training individuals or teams. Employees receive engaging content like videos and quizzes to help them identify social engineering attacks.

Phishing Simulations

Many security awareness training is supplied with simulated phishing exercises. These platforms are configured to send employees realistic-looking but fake phishing messages. The platform will record how the employee interacts with the fake emails and deliver in-context training to educate the employee on what would happen if this was a real phishing message. The training teaches employees all of the subtle social engineering aspects of phishing attacks so that they are more likely to act cautiously when presented with a suspect email or text message.

Business Processes

BEC attacks and other scams rely on manipulating business processes such as financial transactions. By putting checks and measures in place to ensure that these processes are more robust, a business can help mitigate social engineering. For example, if a request to change bank details is received, it should be cross-checked and verified with a line manager or other designated individual.

Robust Authentication

Social engineering attacks often result in stolen login credentials. The risk associated with these types of cyberattacks can be reduced by using extra protection such as multi-factor authentication (MFA), which requires additional credentials to be supplied when an employee requests access. However, it is worth noting that MFA alone is not enough to protect against social engineering and other types of cyberattacks.

Least Privilege Access Enforcement

Lest privileged access is where an employee is allowed access rights based on their role in the company. That is, they are only allowed to access a resource if it is needed for them to carry out their job. Least privilege access enforcement can be handled using Privileged Access Management (PAM) and Identity and Governance Administration (IGA) tools. These can be supplied from a vendor directly or via an MSP.

Email Protection

Email and spam filters should be part of a layered defense against socially engineered cyberattacks. Advanced anti-phishing and anti-spam include behavioral analytics and Natural Language Processing (NLP) technologies that help to identify sophisticated spear-phishing attacks.