skip to Main Content

At The Identity Organisation, we're here to help!

Slide Get in Touch With Us We work closely with our clients to understand their goals and then help them develop their plans in accordance with their core requirements. Our success is our clients success. Get in touch with us to uncover and deliver on opportunities that build lasting value. How to find us The Identity Organisation Ltd
Mercury House
19-21 Chapel Street, Marlow,
Bucks, SL7 2HN
Contact Details +44 (0) 1628 308038

Alternatively, fill in our contact form below and one of our consultants will be in touch.

    Your privacy is important to us, and we want to communicate with you in a way which has your consent and which is in line with UK Law on data protection. As a result of a change in UK law on 25th May 2018, by providing us with your personal details you consent to us processing your data in line with current GDPR requirements.

    Here is where you can review our Privacy & GDPR Statement

    To remove consent at any time, please e-mail with the word "unsubscribe" as the subject.

    +44 (0) 1628 308038

    Social Engineering is a Core Element of Nearly Every Cyber Attack

    Social Engineering Core Element Cyber Attack

    As organizations look to figure out where to strengthen their cybersecurity strategy, industry data provides guidance by pointing at one of the most common aspects of cyberattacks for clues.

    Every cyberattack that requires the intervention of its victims to be successful needs some means of getting the victim’s emotional investment in order to persuade them to perform the desired action (be it clicking a link, opening an attachment, or complying with a request). To attain this emotional investment, the bad guys constantly use social engineering tactics. Whether it’s impersonating an individual or a brand, using current events, or offering something the victim wants or needs, social engineering is the critical part of an attack that helps cybercriminals achieve their malicious goals.

    We’ve already know 91% of cyberattacks begin with spear phishing, but data from security vendor purplesec suggests that social engineering is even more pervasively used than even phishing, citing that 98% of cyber attacks rely on social engineering!

    According to the purplesec data:

    • 43% of IT professionals say they have been targeted by social engineering schemes in the past 12 months
    • New employees are most susceptible to socially engineered attacks, with 60% of IT professionals citing recent hires as being at high risk
    • 21% of current or former employees use social engineering themselves to gain a financial advantage, for revenge, out of curiosity or for fun

    Because of the convincing nature of some of the social engineering tactics used, it’s important for your users to keep their defences up, realizing that an email isn’t necessarily from who it says it’s from, and that any opportunity offered isn’t necessarily real or sincere in nature. Users that undergo new school Security Awareness Training are less prone to fall for social engineering, as they are taught to recognize the unmistakable signs that exist in each attack that can give away the email’s true intentions.

    Free Phishing Security Test

    Would your users fall for convincing phishing attacks? Take the first step now and find out before the bad guys do. Plus, see how you stack up against your peers with phishing Industry Benchmarks. The Phish-prone percentage is usually higher than you expect and is great ammo to get budget.

    PST Results

    Here’s how it works:

    • Immediately start your test for up to 100 users (no need to talk to anyone)
    • Select from 20+ languages and customize the phishing test template based on your environment
    • Choose the landing page your users see after they click
    • Show users which red flags they missed, or a 404 page
    • Get a PDF emailed to you in 24 hours with your Phish-prone % and charts to share with management
    • See how your organization compares to others in your industry

    PS: Don’t like to click on redirected buttons? Cut & Paste this link in your browser:


    Sign Up to the TIO Intel Alerts!

    Back To Top