Social engineering is an attack method where attackers manipulate people instead of systems to gain access to sensitive information. Instead of hacking in, they exploit human behaviours such as trust, stress and respect for authority. Common techniques include fake IT support calls, phishing emails and creating chaos to pressure quick decisions.
In this article, we go through what a modern social engineering attack might look like, why these attacks are increasing, and what your company can concretely do to build a stronger defence: a human firewall.

We've all received them. More or less convincing emails urging action. Log in, send card details, click here. The goal is always the same, to manipulate the recipient into divulging information that grants access to your company.
But today's threat landscape is more sophisticated and attacks are evolving beyond the classic "Click the link" setup. This is an example of a three-step scam scenario that creates chaos and confusion which threat actors can exploit:
The attacker doesn't start with a phishing email. Instead, they use the employee's email to spam the victim's inbox with hundreds of subscriptions and newsletters. The inbox becomes unusable and the employee becomes stressed.
In the midst of the chaos, the victim is contacted by "IT support" via a professionally designed, but fake, Teams account. The attacker offers to help with the spam problem they themselves have caused.
The stressed employee, grateful for the assistance, is tricked into giving the attacker remote access to their computer using a built-in, legitimate tool such as "Quick Assist." No suspicious files need to be downloaded.
The result is that the attacker gains complete control of the computer, can steal data, install permanent backdoors, and move laterally within the network.
With better technical security solutions in place, the attackers' focus shifts to your employees.
There are several reasons why these attacks are so successful and why they are increasing right now. Partly, it is because many companies have begun to realise the risks that neglected cybersecurity entails. With better technical security solutions in place, the attackers' focus shifts to your employees.
The attackers know which human vulnerabilities to press to get a reaction. This can include:
Here, everyone becomes a target. It's not just about tricking the finance department. Even employees without high permissions can be manipulated to give away small pieces of information that collectively open the door for a larger attack.
It's about more than an annual training and memorised rules; it's about long-term culture building.
This requires a concrete, structured action plan for how companies can strengthen their defence against social engineering. It's about more than annual training and memorised rules; it's about long-term culture building. Here are some questions to start with:
Attitudes. How do employees feel about security? Do they see it as relevant to their job?
It's okay not to have answers to all questions today. But it's time to start thinking. Leadership plays a crucial role here. Security cannot be fully delegated to the IT department. Management's commitment and visible support are cornerstones of a strong security culture. A culture where questioning and reporting suspicious events is appreciated, without fear of making mistakes or causing disruption.
The goal is to make this secure behaviour a natural and expected part of employees' everyday lives. Attackers see them as their greatest opportunity. Make sure to turn them into your strongest defence. Invest in your culture today, before attackers exploit it tomorrow.
