top of page

Five Ways to Prevent Social Engineering Attacks

  • Writer: Scott Naisbett
    Scott Naisbett
  • May 11, 2020
  • 3 min read

Updated: Mar 4


Cybersecurity concept showing how businesses can prevent social engineering attacks such as phishing and password scams

Social engineering is a growing cyber security threat. Rather than exploiting technical vulnerabilities, attackers manipulate people into revealing sensitive information or performing actions that compromise security.


Because employees and users are often the final line of defence, organisations must ensure that individuals understand how these attacks work and how to recognise them.

Below are some practical tips to help reduce the risk of social engineering attacks.


Quick Tips to Remember


Think Before You Click

Attackers often create a sense of urgency to pressure individuals into acting quickly without thinking.


If you receive a message asking for immediate action, pause and verify the source first. A good approach is to use a different method of communication to confirm the request. For example, contact the sender by phone or message to verify whether the request is legitimate.


Research the Source

Be cautious when receiving unsolicited messages or emails.


Check the sender’s domain carefully and verify whether the individual actually works for the organisation they claim to represent.


Simple steps such as:


  • checking the company website

  • reviewing staff directories

  • hovering over links before clicking


can help confirm whether the message is genuine.


Email Spoofing Is Common

Hackers frequently compromise accounts and send malicious messages from addresses that appear legitimate.


Even if the email appears to come from someone you know, it is best practice to confirm the message if you were not expecting it.


Never assume a message is safe simply because the sender appears familiar.


Avoid Downloading Unknown Files

Attachments are a common delivery method for malware.


If you:

  • do not recognise the sender

  • were not expecting the message

  • receive an email marked “urgent” with an attachment


it is safer not to open the file.


Ignoring suspicious attachments can significantly reduce the risk of malware infections.


Be Wary of Unexpected Offers or Prizes

Messages promising large sums of money, prizes or other rewards are almost always fraudulent.


If something sounds too good to be true, it usually is.


Five Ways to Protect Yourself From Social Engineering Attacks


1. Never Share Personal Information by Email

Legitimate organisations should never request passwords or sensitive personal information through unsolicited emails.


If you receive such a request, it is almost certainly a scam.



2. Be Cautious of Requests for Help

Social engineers sometimes pose as technical support staff or colleagues requesting assistance.


If you did not request help from the sender, treat the request with suspicion and verify the individual before providing any information.



3. Use Email Spam Filters

Most email platforms include built-in spam filters that can automatically block suspicious messages.


Ensure these filters are enabled and set to a suitable level to reduce the number of potentially harmful emails reaching your inbox.



4. Secure Your Devices

Keeping devices secure is an important defence against cyber threats.


Make sure you:

  • install antivirus software

  • enable firewalls

  • keep software updated

  • use secure internet connections


Some organisations also use VPNs to protect network traffic.


5. Stay Aware of Cyber Security Risks

Cyber threats continue to evolve, so staying informed is essential.


Regularly review cyber security guidance and remain cautious when handling unexpected requests for information.


Being vigilant is one of the most effective ways to prevent social engineering attacks.


Strengthening Your Organisation’s Security

Social engineering attacks target human behaviour rather than technical weaknesses, making awareness and training critical.


Implementing recognised security frameworks such as ISO 27001 can help organisations establish structured controls for protecting sensitive information.


If you would like to improve your organisation’s information security practices, Keystone Standards can help.


Implementing recognised frameworks such as ISO 27001 information security management can help organisations reduce the risk of social engineering attacks.



Keystone Standards Logo

 
 
 

Comments


bottom of page