{"id":18562,"date":"2021-08-25T15:54:43","date_gmt":"2021-08-25T15:54:43","guid":{"rendered":"https:\/\/easydmarc.com\/blog\/?p=18562"},"modified":"2023-04-28T08:59:20","modified_gmt":"2023-04-28T08:59:20","slug":"how-to-spot-the-top-5-social-engineering-attacks","status":"publish","type":"post","link":"https:\/\/easydmarc.com\/blog\/how-to-spot-the-top-5-social-engineering-attacks\/","title":{"rendered":"How to Protect Against Social Engineering Attacks?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Social engineering attacks are more common than ever in the digital age. <\/span><span style=\"font-weight: 400;\">Unfortunately, lack of education about these attacks is also very common. It is now more important than ever to be clued up about these attacks if you\u2019d like to protect your personal information. What can you do to protect yourself? What are some of the early warning signs that suggest you are a soft target for hackers? <\/span><span style=\"font-weight: 400;\">Keep reading to learn all you need to know about social engineering!<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">What is Social Engineering?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Social engineering refers to a range of malicious cyber security threats and activities that are carried out by scammers and hackers. Basically, if you\u2019re a victim of a <a href=\"https:\/\/easydmarc.com\/blog\/social-engineering-a-complete-guide\/\">social engineering<\/a> attack, you were most probably <\/span>psychologically manipulated into revealing personal information<span style=\"font-weight: 400;\"> and <\/span><span style=\"font-weight: 400;\">putting your data at risk<\/span><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Perpetrators thoroughly investigate whomever they want to target and gather information about their weak security protocols and potential points of entry. The most common reasons behind socially engineered attacks are to disrupt and corrupt data to cause an inconvenience, obtain confidential information and financial profit.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These attacks <\/span><span style=\"font-weight: 400;\">exploit a victim\u2019s trust, their naivety, and carelessness with sensitive information. This method of exploitation is often called social engineering psychology. Therefore, it\u2019s really important to avoid any behavioral weakness and to exercise caution when receiving\u00a0 fishy messages, emails, and phone calls.\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Top 5 Social Engineering Techniques<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Scammers and hackers are constantly inventing <\/span><span style=\"font-weight: 400;\">new and improved<\/span><span style=\"font-weight: 400;\"> ways to prey on innocent victims for their own agendas. Despite the numerous social engineering techniques out there, 5 of them stand because they\u2019re so common in the world today.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These top 5 social engineering techniques are:<\/span><\/p>\n<h3 id=\"phishing\"><span style=\"font-weight: 400;\">Phishing<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Phishing attacks are carried out via messages, social media, email or sms. These attacks work by tricking victims into accessing a malicious website<\/span><span style=\"font-weight: 400;\">, in order to <\/span><span style=\"font-weight: 400;\">obtain sensitive information from them. Attackers prey on victims by emotionally triggering them, asking for help, arousing their curiosity. A common method of a phishing attack is to gain a victim\u2019s trust by spoofing a reputable organization\u2019s identity using their logos, images, <\/span><span style=\"font-weight: 400;\">domain<\/span><span style=\"font-weight: 400;\"> and text styles. This attack method is deemed to be one of the most exploited forms of social engineering.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Techniques of social engineering phishing are particularly effective, as hackers are able to send fraudulent messages from email addresses that look to be from the exact same domain name of the entity they target. While the loophole they use is easy to secure, thousands of businesses are still impacted every year, because they don\u2019t authenticate their email origin. A simple <\/span><a href=\"https:\/\/easydmarc.com\/tools\/dmarc-lookup\"><span style=\"font-weight: 400;\">DMARC Record lookup<\/span><\/a><span style=\"font-weight: 400;\"> will tell you if your organization is at risk.<\/span><\/p>\n<h4><span style=\"font-weight: 400;\">Warning Signs of Phishing Attacks:<\/span><\/h4>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The attacker will falsely claim that they\u2019ve noticed suspicious activity or log-in attempts.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">They claim that there\u2019s an error with your payment details or your bank account.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The emails or text messages they send include a fake invoice.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">You\u2019re asked to confirm sensitive information.<\/span><\/li>\n<\/ul>\n<h3 id=\"watering-hole\"><span style=\"font-weight: 400;\">Watering Hole<\/span><\/h3>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/easydmarc.com\/blog\/what-is-a-watering-hole-attack-module-5\/\">Watering hole attacks<\/a> are typically <\/span>performed by skilled attackers<span style=\"font-weight: 400;\">. These attacks involve downloading or launching malicious code from a legitimate website. These attackers can sometimes launch the attacks directly against vulnerable software used by their intended target audience, as opposed to a website they visit. To preserve the value of whomever they choose to exploit, scammers can even wait months before launching the attack.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Due to the nature of these attacks and the fact that they\u2019re often performed by highly skilled hackers after thorough planning, there aren\u2019t any warning signs that you\u2019re about to be attacked. Also, bear in mind that these attacks are aimed at a target audience at large as opposed to individuals. The SolarWinds attack, one of the <\/span><a href=\"https:\/\/www.theguardian.com\/technology\/2020\/dec\/15\/orion-hack-solar-winds-explained-us-treasury-commerce-department\"><span style=\"font-weight: 400;\">most sophisticated cyber-attack in recent years<\/span><\/a><span style=\"font-weight: 400;\">, led to more than 18,000 users downloading a tainted software.\u00a0<\/span><\/p>\n<h3 id=\"whaling-attacks\"><span style=\"font-weight: 400;\">Whaling Attacks<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Whaling attacks are a type of phishing activity. With this technique, attackers will target individuals who are believed to <\/span>have privileged access to systems<span style=\"font-weight: 400;\"> or valuable information. Some of the most common victims of whaling attacks are senior executives and network administrators. Also known as spear phishing, these attacks are carried out following meticulous research to ensure they\u2019re successful in reeling in victims.<\/span><\/p>\n<h4><span style=\"font-weight: 400;\">Warning Signs of whaling attacks:<\/span><\/h4>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A scammer carrying out a whaling attack will often use a domain name that\u2019s very similar to a reputable one. The differences will be barely noticeable and extremely subtle in nature.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Is it a newly registered domain name? These are more likely to be suspicious.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Suspicious messages will include keywords such as \u201cwire transfer\u201d or \u201cbank transfer\u201d.<\/span><\/li>\n<\/ul>\n<h3 id=\"pretexting\"><span style=\"font-weight: 400;\">Pretexting<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Scammers who use this social engineering technique will <\/span>create a fake identity<span style=\"font-weight: 400;\"> to influence their targets into divulging sensitive information. Examples of pretexting include being asked for login details and passwords by an attacker pretending to be an external IT service provider. Bank website credentials and confirmation of bank account numbers are commonly accessed via pretexting.<\/span><\/p>\n<h4><span style=\"font-weight: 400;\">Warning signs of pretexting:<\/span><\/h4>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">You receive a suspicious message that asks you for <\/span><span style=\"font-weight: 400;\">verification of personal information, such as your residence, date of birth, or bank account number.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A scammer tries to initiate a conversation with \u201cAre you available?\u201d to try and build a rapport. The purpose of this tactic is to try and lower the victim\u2019s guard, making them more susceptible for what\u2019s to follow.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">You receive a message with a request from a high profile person who you\u2019re not usually in contact with- such as a CEO. These messages often ask you to do something urgently, with the \u201cCEO\u201d claiming to be busy in a meeting.<\/span><\/li>\n<\/ul>\n<h3 id=\"#baiting-quid-pro-quo-attacks\"><span style=\"font-weight: 400;\">Baiting and Quid Pro Quo Attacks<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Baiting attacks usually involve scammers offering victims useful information, such as a software update or an infected USB token.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/easydmarc.com\/blog\/what-is-quid-pro-quo\/\">Quid pro quo attacks<\/a> are very similar to baiting. The main difference is that with these attacks, hackers promise to perform an action that will be beneficial to the victim. To be able to receive the action that benefits them, victims are asked to perform an action in exchange. An example of how attackers carry out quid pro quo attacks is by calling various extensions at a firm, pretending to be an IT support employee, and targeting someone who actually does have a support issue.<\/span><\/p>\n<h4><span style=\"font-weight: 400;\">Warning signs of baiting and quid pro quo attacks:<\/span><\/h4>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">You receive an offer for downloads and attachments, which seem too good to be true, out of the blue.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">These \u201cgreat deals\u201d are also displayed on social media sites and websites reached through internet searches.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">You receive a random call from someone claiming to offer a service such as IT support.<\/span><\/li>\n<\/ul>\n<h2><span style=\"font-weight: 400;\">How to Protect Yourself Against Socially Engineered Attacks<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Besides practical measures that will keep you or your computer from being compromised, sometimes the best prevention is in adopting the right behavior. That starts by identifying the main psychological levers used by social engineering perpetrators:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Urgency.<\/b><span style=\"font-weight: 400;\"> Are you acting outside your private or work habits and prerogatives, under unusual circumstances requiring immediate measures? You should hit the pause button to think through the situation.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Empathy. <\/b><span style=\"font-weight: 400;\">Many scammers leverage their victim\u2019s savior complex. Helping someone in need is a strong motivator. Be aware that your judgement can be clouded in the pursuit of this satisfaction.\u00a0\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Fear. <\/b><span style=\"font-weight: 400;\">The perspective of losing money, or being infected by a virus, is a common trap used by hackers. They send scary warnings trying to get you to react &#8211; only to be really hacked this time.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Greed.<\/b><span style=\"font-weight: 400;\"> At the opposite of fear, but working on a similar pattern, greed is a powerful tool hackers can use. If you are the benefactor of a totally unexpected win online, you are probably in for a deception.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Sympathy, solidarity, authority&#8230; The range of emotions that can be utilized to build rapport and <\/span><b>gain someone&#8217;s trust<\/b><span style=\"font-weight: 400;\"> is as large as hackers&#8217; imagination. Yet they often revolve around the notions of immediacy, with a strong psychological incentive.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">And sometimes several levers at once, as in social engineering examples of emails received from CEOs requesting an urgent money transfer. Being aware of these emotional dynamics will help you identify them.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Practical Steps to Prevent Social Engineering Hacking<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">We\u2019ve all heard the saying <\/span>\u201cPrevention is better than cure\u201d<span style=\"font-weight: 400;\"> multiple times in our lives, and this couldn\u2019t be any more true within the context of social engineering. Here is what you can do to protect yourself against becoming a victim:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Identify the source of any messages to determine whether they\u2019re trustworthy.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Reject unsolicited requests for help or offers of help<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Delete requests for sensitive information and passwords.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Set your spam filter to a high security level.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Protect your email ecosystem with a trusted partner in social engineering cyber security, such as <\/span><a href=\"https:\/\/easydmarc.com\/about-us\"><span style=\"font-weight: 400;\">EasyDMARC<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Always be cautious and only respond to messages that you\u2019re 100% sure about.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Secure your devices by installing anti-virus software, firewalls and email filters.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Respond to messages and calls with \u201cWho do you report to?\u201d as a way to verify the sender\u2019s identity.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Keep in mind your digital footprint &#8211; make sure that any details that can be used to access your accounts and sensitive information aren\u2019t displayed on social media.<\/span><\/li>\n<\/ol>\n<h2><span style=\"font-weight: 400;\">That\u2019s a Wrap!<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">So, there you have it, everything you need to know about social engineering attacks. The main thing you can do to protect yourself is to <\/span>exercise just a little vigilance and caution<span style=\"font-weight: 400;\">. Scammers and hackers prey on those who exhibit behavioral weakness, so it\u2019s best to keep your guard up at all times. The most important thing to note is: <\/span>preventative measures are key!<\/p>\n<p style=\"text-align: center;\"><a class=\"maxbutton-1 maxbutton maxbutton-sign-up\" title=\"SIGN UP FREE\" href=\"https:\/\/app.easydmarc.com\/register\"><span class='mb-text'>Sign Up Free<\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Social engineering attacks are more common than ever &#8230;<\/p>\n","protected":false},"author":1,"featured_media":18576,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[204,290,199,289],"tags":[],"class_list":["post-18562","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-cyberattacks-cyberthreats","category-cybersecurity","category-social-engineering"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How to Protect Against Social Engineering Attacks? | EasyDMARC<\/title>\n<meta name=\"description\" content=\"What are the top Social engineering attacks? How can you protect yourself? There are clear signs that can help you spot these attacks and prevent them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/easydmarc.com\/blog\/how-to-spot-the-top-5-social-engineering-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Protect Against Social Engineering Attacks?\" \/>\n<meta property=\"og:description\" content=\"What are the top Social engineering attacks? How can you protect yourself? There are clear signs that can help you spot these attacks and prevent them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/easydmarc.com\/blog\/how-to-spot-the-top-5-social-engineering-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"EasyDMARC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EasyDMARC\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-25T15:54:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-28T08:59:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/08\/social-engineering-attacks-3.0.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"810\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"EasyDMARC\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:site\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EasyDMARC\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-to-spot-the-top-5-social-engineering-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-to-spot-the-top-5-social-engineering-attacks\\\/\"},\"author\":{\"name\":\"EasyDMARC\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\"},\"headline\":\"How to Protect Against Social Engineering Attacks?\",\"datePublished\":\"2021-08-25T15:54:43+00:00\",\"dateModified\":\"2023-04-28T08:59:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-to-spot-the-top-5-social-engineering-attacks\\\/\"},\"wordCount\":1602,\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-to-spot-the-top-5-social-engineering-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/social-engineering-attacks-3.0.png\",\"articleSection\":[\"Blog\",\"Cyberattacks and Cyberthreats\",\"Cybersecurity\",\"Social Engineering\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-to-spot-the-top-5-social-engineering-attacks\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-to-spot-the-top-5-social-engineering-attacks\\\/\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-to-spot-the-top-5-social-engineering-attacks\\\/\",\"name\":\"How to Protect Against Social Engineering Attacks? | EasyDMARC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-to-spot-the-top-5-social-engineering-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-to-spot-the-top-5-social-engineering-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/social-engineering-attacks-3.0.png\",\"datePublished\":\"2021-08-25T15:54:43+00:00\",\"dateModified\":\"2023-04-28T08:59:20+00:00\",\"description\":\"What are the top Social engineering attacks? How can you protect yourself? There are clear signs that can help you spot these attacks and prevent them.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-to-spot-the-top-5-social-engineering-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-to-spot-the-top-5-social-engineering-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-to-spot-the-top-5-social-engineering-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/social-engineering-attacks-3.0.png\",\"contentUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/social-engineering-attacks-3.0.png\",\"width\":1440,\"height\":810,\"caption\":\"social engineering attacks 3.0\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-to-spot-the-top-5-social-engineering-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cyberattacks and Cyberthreats\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/cyberattacks-cyberthreats\\\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Social Engineering\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/cyberattacks-cyberthreats\\\/social-engineering\\\/\"},{\"@type\":\"ListItem\",\"position\":6,\"name\":\"How to Protect Against Social Engineering Attacks?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/\",\"name\":\"EasyDMARC\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/#organization\",\"name\":\"EasyDMARC\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/img\\\/logo.png\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EasyDMARC\\\/\",\"https:\\\/\\\/x.com\\\/easydmarc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/easydmarc\\\/mycompany\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\",\"name\":\"EasyDMARC\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"caption\":\"EasyDMARC\"},\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/author\\\/easydmarc\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to Protect Against Social Engineering Attacks? | EasyDMARC","description":"What are the top Social engineering attacks? How can you protect yourself? There are clear signs that can help you spot these attacks and prevent them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/easydmarc.com\/blog\/how-to-spot-the-top-5-social-engineering-attacks\/","og_locale":"en_US","og_type":"article","og_title":"How to Protect Against Social Engineering Attacks?","og_description":"What are the top Social engineering attacks? How can you protect yourself? There are clear signs that can help you spot these attacks and prevent them.","og_url":"https:\/\/easydmarc.com\/blog\/how-to-spot-the-top-5-social-engineering-attacks\/","og_site_name":"EasyDMARC","article_publisher":"https:\/\/www.facebook.com\/EasyDMARC\/","article_published_time":"2021-08-25T15:54:43+00:00","article_modified_time":"2023-04-28T08:59:20+00:00","og_image":[{"width":1440,"height":810,"url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/08\/social-engineering-attacks-3.0.png","type":"image\/png"}],"author":"EasyDMARC","twitter_card":"summary_large_image","twitter_creator":"@easydmarc","twitter_site":"@easydmarc","twitter_misc":{"Written by":"EasyDMARC","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/easydmarc.com\/blog\/how-to-spot-the-top-5-social-engineering-attacks\/#article","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/how-to-spot-the-top-5-social-engineering-attacks\/"},"author":{"name":"EasyDMARC","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97"},"headline":"How to Protect Against Social Engineering Attacks?","datePublished":"2021-08-25T15:54:43+00:00","dateModified":"2023-04-28T08:59:20+00:00","mainEntityOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/how-to-spot-the-top-5-social-engineering-attacks\/"},"wordCount":1602,"publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/how-to-spot-the-top-5-social-engineering-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/08\/social-engineering-attacks-3.0.png","articleSection":["Blog","Cyberattacks and Cyberthreats","Cybersecurity","Social Engineering"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/easydmarc.com\/blog\/how-to-spot-the-top-5-social-engineering-attacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/easydmarc.com\/blog\/how-to-spot-the-top-5-social-engineering-attacks\/","url":"https:\/\/easydmarc.com\/blog\/how-to-spot-the-top-5-social-engineering-attacks\/","name":"How to Protect Against Social Engineering Attacks? | EasyDMARC","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/how-to-spot-the-top-5-social-engineering-attacks\/#primaryimage"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/how-to-spot-the-top-5-social-engineering-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/08\/social-engineering-attacks-3.0.png","datePublished":"2021-08-25T15:54:43+00:00","dateModified":"2023-04-28T08:59:20+00:00","description":"What are the top Social engineering attacks? How can you protect yourself? There are clear signs that can help you spot these attacks and prevent them.","breadcrumb":{"@id":"https:\/\/easydmarc.com\/blog\/how-to-spot-the-top-5-social-engineering-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/easydmarc.com\/blog\/how-to-spot-the-top-5-social-engineering-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/easydmarc.com\/blog\/how-to-spot-the-top-5-social-engineering-attacks\/#primaryimage","url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/08\/social-engineering-attacks-3.0.png","contentUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/08\/social-engineering-attacks-3.0.png","width":1440,"height":810,"caption":"social engineering attacks 3.0"},{"@type":"BreadcrumbList","@id":"https:\/\/easydmarc.com\/blog\/how-to-spot-the-top-5-social-engineering-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/easydmarc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/"},{"@type":"ListItem","position":4,"name":"Cyberattacks and Cyberthreats","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/cyberattacks-cyberthreats\/"},{"@type":"ListItem","position":5,"name":"Social Engineering","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/cyberattacks-cyberthreats\/social-engineering\/"},{"@type":"ListItem","position":6,"name":"How to Protect Against Social Engineering Attacks?"}]},{"@type":"WebSite","@id":"https:\/\/easydmarc.com\/blog\/#website","url":"https:\/\/easydmarc.com\/blog\/","name":"EasyDMARC","description":"Blog","publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/easydmarc.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/easydmarc.com\/#organization","name":"EasyDMARC","url":"https:\/\/easydmarc.com\/","logo":{"@type":"ImageObject","url":"https:\/\/easydmarc.com\/img\/logo.png"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EasyDMARC\/","https:\/\/x.com\/easydmarc","https:\/\/www.linkedin.com\/company\/easydmarc\/mycompany\/"]},{"@type":"Person","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97","name":"EasyDMARC","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","caption":"EasyDMARC"},"url":"https:\/\/easydmarc.com\/blog\/author\/easydmarc\/"}]}},"jetpack_featured_media_url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/08\/social-engineering-attacks-3.0.png","_links":{"self":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/18562","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/comments?post=18562"}],"version-history":[{"count":0,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/18562\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media\/18576"}],"wp:attachment":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media?parent=18562"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/categories?post=18562"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/tags?post=18562"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}