Social Engineering: The Art of Human Manipulation

Featured annually during October, and now in its 21st year, CIRMA observes Cybersecurity Awareness Month by highlighting the importance of staying safe online. We will share some of our most vital cybersecurity resources throughout October to help you and your employees understand and overcome existing and emerging cyber exposures. To kick things off, we will explore the topic of social engineering, what it is, and why it is so important.

Social engineering attacks are often highly profitable for cybercriminals and are one of the most common ways they exploit human instincts. Social engineering uses psychological manipulation instead of exploiting technical vulnerabilities and takes advantage of a victim’s instincts and emotions to obtain sensitive information. An attacker uses human interaction to obtain or compromise information about an organization or its computer systems. An attacker may seem unassuming and respectable, possibly claiming to be a new employee, repair person, or researcher and even offering credentials to support that identity. However, by asking questions, he or she may be able to piece together enough information to infiltrate an organization’s network. Suppose an attacker cannot gather enough information from one source. In that case, he or she may contact another source within the same organization and rely on the information from the first source to add to his or her credibility.

Pretexting, a social engineering tactic used in business email compromise (BEC) scams, remains the primary cause of cybersecurity incidents, with attackers targeting users through existing email threads in their relentless efforts to obtain sensitive data for their financial gain. BEC scams make up about 24% to 25% of money-driven attacks, with the typical transaction amounting to $50,000 annually (2023 Verizon Data Breach Investigations Report).  

Cyber threat actors use various methods to infiltrate network systems and expose sensitive and vulnerable information. Phishing is the most common method of social engineering, where a hacker often convinces their victim to click a malicious link or software in an email. Baiting is another prevalent method of social engineering, referring to bad actors luring their victims into relinquishing sensitive information by tempting them with a valuable object or offer. For example, an attacker may send an email that may appear to be from a coworker, business partner, or financial institution that requests account information, often suggesting that there is a problem. When users respond with the requested information, attackers can use it to access the accounts. Attackers also use holidays, epidemics, and natural disasters to solicit personal information and use voice communication and text messages to deceive their victims. 

Attackers use holidays, epidemics, and natural disasters to solicit personal information and use voice communication and text messages to deceive their victims.

 Key findings in the 2024 Verizon Data Breach Investigations Report:

  • 95% of cyber threat actors were motivated by financial gain
  • 5% of cyber threat actors were inspired by espionage
  • Techniques utilized to gain unauthorized access to an organization:
    • 49% were carried out through pretexting
    • 31% were carried out through phishing

Social engineering attacks are notoriously difficult to prevent, as they depend heavily on the human element. It takes one employee’s mistake to compromise a municipal network’s integrity, demonstrating the significance of training employees on cybersecurity awareness. Data security policies combined with cybersecurity awareness training can assist employees in understanding how to detect and respond to social engineering attacks.

Ensuring municipal and school board employees are aware of and adequately trained on cybersecurity best practices can help minimize the risk of a costly and disruptive data breach. Risk Management offers a Cyber Webinar Series through its exclusive CIRMA member Vector Solutions platform. This robust training and education tool features cybersecurity-related online training courses and webinars proven to educate employees and reduce costly and disruptive cyber exposures.  Courses and webinars are available for employees to learn at their own pace, 24 hours a day, seven days a week.

If you haven’t taken advantage of the many benefits available through CIRMA’s exclusive online training and education platform, contact your local CIRMA Risk Management representative to get started today. There is no additional charge to CIRMA members for this service. Visit CIRMA’s Cyber Center for helpful information on preventing and managing cyber exposures. Contact your local CIRMA Risk Management representative to get started today.

Helpful Cyber Resources for CIRMA Members:

Back to Blog Next Article
weak password help

Still Using Weak Passwords? Do This Instead.

Passwords have long been firmly established as the weakest link in an organization’s cybersecurity. Here's what you can do to avoid this significant yet…

View Posts

Block the Bait: Cyber Phishing Attacks

Human error (still) remains the leading cause of cybersecurity breaches, as employees continue to fall victim to phishing attacks. Verizon’s Data Breach Investigation report…

View Posts
beat cyber social engineering attacks

Social Engineering: The Art of Human Manipulation

Social engineering cyberattacks are becoming increasingly prevalent, costing municipalities millions annually. Here's what you can you do to be cyber smart.

View Posts

Social and Emotional Awareness

Failure to cultivate a workplace culture that advocates for mental health can subject employers to legal risks, including claims of workplace violence or failure…

View Posts

Work Zone Safety Works

It's everyone's collective responsibility to ensure safety in work zones. Road workers rely on their communities to keep them safe at work. CIRMA provides…

View Posts
wellness at work

Wellness at Work

The adoption of workplace social and emotional health programs skyrocketed over the past two years due to heightened visibility during the pandemic when remote…

View Posts
home work environment tips and best practices

Whitepaper: Create a Home Work Environment that Works for You

Creating a home workspace does not require extraordinary upgrades to your home or even purchasing fancy office equipment. Setting up a workspace with basic…

View Posts

Personal Protective Equipment for Public Entity Employees

Proper use of personal Protective Equipment (PPE) is crucial for accident prevention in the municipal workplace. PPE can safeguard employees from potential risks, ensure their well-being,…

View Posts
wrist injury sprain strain workers comp

Preventing Sprains & Strains

Sprain and strain injuries are the most common and costly workplace injuries. Employees can injure their knee, shoulder, wrist, or back while performing everyday…

View Posts