{"id":14982,"date":"2024-08-02T13:38:33","date_gmt":"2024-08-02T13:38:33","guid":{"rendered":"https:\/\/trustpair.com\/blog\/the-top-5-social-engineering-techniques-and-how-to-prevent-them\/"},"modified":"2025-07-15T14:44:03","modified_gmt":"2025-07-15T14:44:03","slug":"the-top-5-social-engineering-techniques-and-how-to-prevent-them","status":"publish","type":"post","link":"https:\/\/trustpair.com\/gb\/blog\/the-top-5-social-engineering-techniques-and-how-to-prevent-them\/","title":{"rendered":"The top 5 social engineering techniques and how to prevent them"},"content":{"rendered":"<p>Social engineering techniques were <strong>the number one cause of fraud last year<\/strong>. From political smear campaigns to bitcoin scams, fraudsters are becoming more complex by exploiting the human psyche. With over $6.9 billion stolen from businesses by <a href=\"https:\/\/trustpair.com\/gb\/blog\/what-is-social-engineering-fraud-and-how-does-it-work\/\">social engineering scams<\/a> in 2021, it\u2019s time for organizations to fight back. Learn about <strong>what social engineering techniques are<\/strong>, and how to spot the red flags before protecting your business.<\/p>\n<p>Trustpair continuously <a href=\"https:\/\/trustpair.com\/gb\/blog\/the-6-strategies-for-effective-payment-fraud-management\/\">controls payments<\/a> before they\u2019re executed, blocking payments to suspicious third parties. Even sophisticated social engineering attacks won\u2019t get through! <a href=\"https:\/\/trustpair.com\/gb\/demo-5\/\">Request a demo to learn more!<\/a><\/p>\n<p><!--HubSpot Call-to-Action Code --><span id=\"hs-cta-wrapper-f87ea066-7298-4ae0-bcd1-f309efec12d5\" class=\"hs-cta-wrapper\"><span id=\"hs-cta-f87ea066-7298-4ae0-bcd1-f309efec12d5\" class=\"hs-cta-node hs-cta-f87ea066-7298-4ae0-bcd1-f309efec12d5\"><!-- [if lte IE 8]>\n\n\n<div id=\"hs-cta-ie-element\"><\/div>\n\n\n<![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5278241\/f87ea066-7298-4ae0-bcd1-f309efec12d5\"><img decoding=\"async\" id=\"hs-cta-img-f87ea066-7298-4ae0-bcd1-f309efec12d5\" class=\"hs-cta-img\" style=\"border-width: 0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5278241\/f87ea066-7298-4ae0-bcd1-f309efec12d5.png\" alt=\"Nouveau call-to-action\" \/><\/a><\/span><script charset=\"utf-8\" src=\"https:\/\/js.hscta.net\/cta\/current.js\"><\/script><script type=\"text\/javascript\"> hbspt.cta.load(5278241, 'f87ea066-7298-4ae0-bcd1-f309efec12d5', {\"useNewLoader\":\"true\",\"region\":\"na1\"}); <\/script><\/span><!-- end HubSpot Call-to-Action Code --><\/p>\n<h2>What is social engineering?<\/h2>\n<p>Social engineering refers to the <strong>manipulation of human victims<\/strong> (as opposed to computers) into granting fraudsters access to something. Usually, the goal is either financial account access, or sensitive information.<\/p>\n<p>Social engineering techniques can target both individuals and businesses. There have been many successful attempts in the past. They typically aim to build trust with the victim, introduce a figure of authority, or pretend to benefit the victim in some way.<\/p>\n<p>In the next section, you\u2019ll learn about five of the most common social engineering techniques that fraudsters apply to their scams, along with real-life examples for each method.<\/p>\n<h2>What are the top 5 social engineering techniques?<\/h2>\n<p>Here are five of the <strong>most common social engineering techniques<\/strong> to watch out for:<\/p>\n<ul>\n<li><a href=\"https:\/\/trustpair.com\/gb\/blog\/the-7-ways-to-recognize-phishing-and-avoid-it\/\">Phishing<\/a><\/li>\n<li>Baiting<\/li>\n<li>Watering Holes<\/li>\n<li>Pretexting<\/li>\n<li>Physical Breaches<\/li>\n<\/ul>\n<h3>Phishing<\/h3>\n<p>Phishing is the most well-known term for a social engineering technique. It refers to the <strong>impersonation of someone known to the victim<\/strong>, in order to gain their trust. For example, CEO fraud relies on the fraudster impersonating the CEO or another top executive. This type of impersonation is known as <a href=\"https:\/\/trustpair.com\/gb\/blog\/whaling-phishing-attacks-what-are-they-and-how-to-protect-yourself\/\">whaling<\/a> and relies on convincing an employee to follow their request based on this authority.<\/p>\n<p>In businesses, phishing can occur via email channels. But it can also be done through the phone with vishing (<a href=\"https:\/\/trustpair.com\/gb\/blog\/deep-voice-technology-an-increasing-fraud-risk\/\">voice phishing<\/a>). This typically includes the use of AI technology to deep fake a true voice. Alternatively, phishing can occur through text messages (<a href=\"https:\/\/trustpair.com\/gb\/blog\/smishing-and-phishing-definition-key-differences-and-examples\/\">smishing<\/a>).<\/p>\n<p>One of the most famous phishing cases targeted both Facebook and Google over multiple attempts in the 2010s. The perpetrator committed vendor fraud by pretending to be a genuine supplier, and neither company did their due diligence before paying false invoices, which came via email channels.<\/p>\n<p>It resulted in losses of more than $100 million combined, and the fraudster was later convicted.<\/p>\n<h3>Baiting<\/h3>\n<p>Baiting is a little bit different from phishing, <strong>as this social engineering technique relies on the human nature of curiosity.<\/strong> Here, the fraudsters promise the victim something in return for them following a request, which then turns out to compromise their system.<\/p>\n<p>It relies on the idea of FOMO (fear of missing out). For example, victims might click on a link for a free music download.<\/p>\n<p>Baiting is sometimes known as \u201cquid pro quo\u201d fraud because <strong>the victim thinks they are giving away their information for something in return.<\/strong> Let\u2019s imagine that you\u2019re called up by an IT support person who\u2019ll help you fix a broken app &#8211; of course, you\u2019ll give them remote access to your device! Unless you realize that they\u2019re not a real IT support person after all.<\/p>\n<p>Baiting happened recently for a portion of Office365 users, who were targeted over a fake layoff scam. Employees were each sent an email reminder of their \u201cupcoming\u201d meeting with HR over their redundancy.<\/p>\n<p>The hope of the scam was that the victims would panic, click on the Zoom link and attempt to log into the fake meeting without considering the fact that they are giving away their credentials to a spoofed site. Not only did the fraudsters walk away with Zoom data, but many people used the same passwords for multiple sites, so it\u2019s likely that the criminals could access many more accounts too.<\/p>\n<h3>Watering Hole<\/h3>\n<p>A watering hole is<strong> another type of social engineering technique<\/strong>, and it\u2019s a scam that aims to <strong>snare people who all have the same attributes<\/strong>, such as all banking with a certain institution, or all retirement aged. Therefore, the watering hole aims to give the fraudsters an accurate target &#8211; people who don\u2019t fit will simply ignore it, but those who do are likely to fall for the scam.<\/p>\n<p>From there, the<a href=\"https:\/\/trustpair.com\/gb\/blog\/cybercriminals-and-how-to-protect-your-company-against-them\/\"> cybercriminals<\/a> snare these individuals for their credentials.<\/p>\n<p>Here\u2019s an example of how a watering hole works:<\/p>\n<ol>\n<li>The perpetrators decide they want to target employees of bank A that work in the accounting team (these employees are likely to have the authority to approve payments)<\/li>\n<li>The hackers find out which accounting software third party that bank A works with<\/li>\n<li>They spoof the real website of the accounting software with a fake one<\/li>\n<li>They send an email out to all employees of Bank A about the accounting software, with a link. Once clicked on, the employees will be redirected to the fake website<\/li>\n<li>Employees input their credentials to log into the accounting software &#8211; they do this multiple times as an error message keeps popping up<\/li>\n<\/ol>\n<p>On the other end, the criminals now have the real login details for the bank into their accounting software, and can <strong>wipe all of the data from the real accounting system for malicious use.<\/strong> In fact, all of that really happened to Ukrainian businesses and banks last year when a common accounting platform was hacked on a national holiday in Ukraine, in an attempt to collapse the economy.<\/p>\n<p>With more research and targeting, watering holes can be used to catch individuals in the form of <a href=\"https:\/\/trustpair.com\/gb\/blog\/4-examples-of-spear-phishing-attacks\/\">spear phishing.<\/a> But typically, this technique is used to fool groups of people who each qualify, because they\u2019re all customers of a certain firm or they all have payment responsibilities at work.<\/p>\n<h3>Pretexting<\/h3>\n<p>Pretexting is the idea that <strong>an impersonator needs critical information in order to perform their task.<\/strong> Here, the social engineering masterminds tend to impersonate figures of authority in society, such as emergency services, banks, and lawyers. That\u2019s because the average person is much more likely to follow the requests of these members of society.<\/p>\n<p>A damaging example of pretexting occurred in 2022 when cybercriminals impersonated Crowdstrike, a well-known and trusted IT security firm. The fraudsters let targets know that they had fallen victim to a malware infection via letter, and to call the number listed in order to remove the infection.<\/p>\n<p>The letters were made to look more legitimate because they had individual incident numbers, and mentioned recent regulatory compliance measures. Of course, any victim who did call the number to remove the malware ended up giving remote access to their device to the hackers, who deployed ransomware and extorted their data.<\/p>\n<h3>Physical breach<\/h3>\n<p>In rare cases, fraudsters will come offline and <strong>attempt to breach a workplace location in person<\/strong>. This physical breach is also known as<strong> tailgating,<\/strong> and usually happens when the perpetrator sneaks into a building. This could be possible by closely following a real employee who holds the door open (so that they aren\u2019t required to open any doors themself), or by spoofing an ID card.<\/p>\n<p>Usually, physical breaches are highly targeted, just like <a href=\"https:\/\/trustpair.com\/gb\/blog\/whaling-vs-spear-phishing-what-are-the-differences\/\">cases of spear phishing or whaling.<\/a><\/p>\n<p>After accessing a secured area, these perpetrators might attempt to steal confidential information, but they tend to have different goals:<\/p>\n<ul>\n<li>Damaging property as a disgruntled customer or ex-employee<\/li>\n<li>Disrupt the business<\/li>\n<li>Gain operational secrets like new prototypes<\/li>\n<li>Theft products to be later sold on<\/li>\n<\/ul>\n<p>Versprite, a security company, recently tested one of their clients&#8217; incident response plans by<strong> setting up a real tailgating situation<\/strong>. Unknown to staff, an external team member had been able to sneak into their workplace.<\/p>\n<p>Although a security guard spotted the breach on CCTV, their internal investigation only found that the perpetrator had stolen a laptop. Instead, he had been in the server room and moved some cables to provide access to the internal network at the client&#8217;s workplace. This was left undetected for weeks before the real security team stepped in to overhaul the response process.<\/p>\n<p>Learn how to defend yourself against B2B fraud in <a href=\"https:\/\/trustpair.com\/gb\/resources\/2025-uk-fraud-trends-and-insights\/\">our latest fraud report!<\/a><\/p>\n<p><!--HubSpot Call-to-Action Code --><span id=\"hs-cta-wrapper-26e69232-c009-4130-a9a9-c5b1c44d4013\" class=\"hs-cta-wrapper\"><span id=\"hs-cta-26e69232-c009-4130-a9a9-c5b1c44d4013\" class=\"hs-cta-node hs-cta-26e69232-c009-4130-a9a9-c5b1c44d4013\"><!-- [if lte IE 8]>\n\n\n<div id=\"hs-cta-ie-element\"><\/div>\n\n\n<![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5278241\/26e69232-c009-4130-a9a9-c5b1c44d4013\"><img decoding=\"async\" id=\"hs-cta-img-26e69232-c009-4130-a9a9-c5b1c44d4013\" class=\"hs-cta-img\" style=\"border-width: 0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5278241\/26e69232-c009-4130-a9a9-c5b1c44d4013.png\" alt=\"fraud study us\" \/><\/a><\/span><script charset=\"utf-8\" src=\"https:\/\/js.hscta.net\/cta\/current.js\"><\/script><script type=\"text\/javascript\"> hbspt.cta.load(5278241, '26e69232-c009-4130-a9a9-c5b1c44d4013', {\"useNewLoader\":\"true\",\"region\":\"na1\"}); <\/script><\/span><!-- end HubSpot Call-to-Action Code --><\/p>\n<h2>How to prevent social engineering attacks?<\/h2>\n<p>Social engineering attacks are hard to prevent, but if you can <strong>provide the right awareness training<\/strong>, staff will know what to look for. Businesses that put the right detection and protection measures in place ensure that even if their employees or systems fall victim, their data and finances remain safe.<\/p>\n<p>Firstly, there are some human elements that your business can control. By implementing <a href=\"https:\/\/trustpair.com\/gb\/blog\/how-to-reduce-and-detect-internal-fraud-risk\/\">strong internal control policies<\/a>, you can provide general rules of conduct and the exact steps that an employee should work through in the event of an attack. The code of conduct might include:<\/p>\n<ul>\n<li>Don\u2019t open emails from sources you don\u2019t know and trust<\/li>\n<li>Don\u2019t ignore the spam filter indicated on your emails<\/li>\n<li>Don\u2019t take your laptop outside of the workplace or log into personal accounts<\/li>\n<li>Create different passwords for separate accounts<\/li>\n<\/ul>\n<p>Moreover, it could be useful to <strong>protect digital systems against social engineering<\/strong>. Here, organizations can implement upgraded spam filters, anti-virus software, and two-factor authentication to log into any company accounts.<\/p>\n<p>Finally, use Trustpair as your last line of defense. <a href=\"https:\/\/trustpair.com\/gb\/automated-account-validation\/\">We use automation to continuously control third-party payments by validating account information<\/a>. We help to block the effects of social engineering by protecting payments from leaving your account automatically.<\/p>\n<p><a href=\"https:\/\/trustpair.com\/gb\/demo-5\/\">Demo Trustpair today to protect your business from social engineering fraudsters.<\/a><\/p>\n<p><strong>To recap&#8230;<\/strong><\/p>\n<p>Social engineering <strong>manipulates human nature<\/strong> so that fraudsters can gain access to data or money. Phishing, baiting, watering holes, pretexting, and physical breaches are <strong>examples of social engineering techniques<\/strong>. Prevent this fraud by setting and following the right protocols, putting physical barriers onto your devices, and educating employees. Trustpair blocks the effects of social engineering by automatically preventing payments from leaving your account when the account details can\u2019t be verified.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Social engineering techniques were the number one cause of fraud last year. From political smear campaigns to bitcoin scams, fraudsters are becoming more complex by exploiting the human psyche. With over $6.9 billion stolen from businesses by social engineering scams in 2021, it\u2019s time for organizations to fight back. Learn about what social engineering techniques [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":14983,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[117],"tags":[],"class_list":["post-14982","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-fraud-protection-gb"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The top 5 social engineering techniques - Trustpair<\/title>\n<meta name=\"description\" content=\"Social engineering techniques include phishing, whaling, baiting\u2026 Learn how to spot and prevent social engineering attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/trustpair.com\/gb\/blog\/the-top-5-social-engineering-techniques-and-how-to-prevent-them\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The top 5 social engineering techniques - Trustpair\" \/>\n<meta property=\"og:description\" content=\"Social engineering techniques include phishing, whaling, baiting\u2026 Learn how to spot and prevent social engineering attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/trustpair.com\/gb\/blog\/the-top-5-social-engineering-techniques-and-how-to-prevent-them\/\" \/>\n<meta property=\"og:site_name\" content=\"Trustpair\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-02T13:38:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-15T14:44:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_2164013427.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"593\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"trustpair_2438\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"trustpair_2438\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/the-top-5-social-engineering-techniques-and-how-to-prevent-them\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/the-top-5-social-engineering-techniques-and-how-to-prevent-them\/\"},\"author\":{\"name\":\"trustpair_2438\",\"@id\":\"https:\/\/trustpair.com\/gb\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034\"},\"headline\":\"The top 5 social engineering techniques and how to prevent them\",\"datePublished\":\"2024-08-02T13:38:33+00:00\",\"dateModified\":\"2025-07-15T14:44:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/the-top-5-social-engineering-techniques-and-how-to-prevent-them\/\"},\"wordCount\":1655,\"publisher\":{\"@id\":\"https:\/\/trustpair.com\/gb\/#organization\"},\"image\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/the-top-5-social-engineering-techniques-and-how-to-prevent-them\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_2164013427.jpg\",\"articleSection\":[\"Fraud protection\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/the-top-5-social-engineering-techniques-and-how-to-prevent-them\/\",\"url\":\"https:\/\/trustpair.com\/gb\/blog\/the-top-5-social-engineering-techniques-and-how-to-prevent-them\/\",\"name\":\"The top 5 social engineering techniques - Trustpair\",\"isPartOf\":{\"@id\":\"https:\/\/trustpair.com\/gb\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/the-top-5-social-engineering-techniques-and-how-to-prevent-them\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/the-top-5-social-engineering-techniques-and-how-to-prevent-them\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_2164013427.jpg\",\"datePublished\":\"2024-08-02T13:38:33+00:00\",\"dateModified\":\"2025-07-15T14:44:03+00:00\",\"description\":\"Social engineering techniques include phishing, whaling, baiting\u2026 Learn how to spot and prevent social engineering attacks.\",\"breadcrumb\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/the-top-5-social-engineering-techniques-and-how-to-prevent-them\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/trustpair.com\/gb\/blog\/the-top-5-social-engineering-techniques-and-how-to-prevent-them\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/the-top-5-social-engineering-techniques-and-how-to-prevent-them\/#primaryimage\",\"url\":\"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_2164013427.jpg\",\"contentUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_2164013427.jpg\",\"width\":1200,\"height\":593},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/the-top-5-social-engineering-techniques-and-how-to-prevent-them\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/trustpair.com\/gb\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The top 5 social engineering techniques and how to prevent them\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/trustpair.com\/gb\/#website\",\"url\":\"https:\/\/trustpair.com\/gb\/\",\"name\":\"Trustpair\",\"description\":\"Leading Payment Fraud Prevention Platform\",\"publisher\":{\"@id\":\"https:\/\/trustpair.com\/gb\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/trustpair.com\/gb\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/trustpair.com\/gb\/#organization\",\"name\":\"Trustpair\",\"url\":\"https:\/\/trustpair.com\/gb\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/trustpair.com\/gb\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg\",\"contentUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg\",\"width\":304,\"height\":73,\"caption\":\"Trustpair\"},\"image\":{\"@id\":\"https:\/\/trustpair.com\/gb\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/trustpair.com\/gb\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034\",\"name\":\"trustpair_2438\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g\",\"caption\":\"trustpair_2438\"},\"sameAs\":[\"http:\/\/trustpair.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The top 5 social engineering techniques - Trustpair","description":"Social engineering techniques include phishing, whaling, baiting\u2026 Learn how to spot and prevent social engineering attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/trustpair.com\/gb\/blog\/the-top-5-social-engineering-techniques-and-how-to-prevent-them\/","og_locale":"en_GB","og_type":"article","og_title":"The top 5 social engineering techniques - Trustpair","og_description":"Social engineering techniques include phishing, whaling, baiting\u2026 Learn how to spot and prevent social engineering attacks.","og_url":"https:\/\/trustpair.com\/gb\/blog\/the-top-5-social-engineering-techniques-and-how-to-prevent-them\/","og_site_name":"Trustpair","article_published_time":"2024-08-02T13:38:33+00:00","article_modified_time":"2025-07-15T14:44:03+00:00","og_image":[{"width":1200,"height":593,"url":"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_2164013427.jpg","type":"image\/jpeg"}],"author":"trustpair_2438","twitter_card":"summary_large_image","twitter_misc":{"Written by":"trustpair_2438","Estimated reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/trustpair.com\/gb\/blog\/the-top-5-social-engineering-techniques-and-how-to-prevent-them\/#article","isPartOf":{"@id":"https:\/\/trustpair.com\/gb\/blog\/the-top-5-social-engineering-techniques-and-how-to-prevent-them\/"},"author":{"name":"trustpair_2438","@id":"https:\/\/trustpair.com\/gb\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034"},"headline":"The top 5 social engineering techniques and how to prevent them","datePublished":"2024-08-02T13:38:33+00:00","dateModified":"2025-07-15T14:44:03+00:00","mainEntityOfPage":{"@id":"https:\/\/trustpair.com\/gb\/blog\/the-top-5-social-engineering-techniques-and-how-to-prevent-them\/"},"wordCount":1655,"publisher":{"@id":"https:\/\/trustpair.com\/gb\/#organization"},"image":{"@id":"https:\/\/trustpair.com\/gb\/blog\/the-top-5-social-engineering-techniques-and-how-to-prevent-them\/#primaryimage"},"thumbnailUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_2164013427.jpg","articleSection":["Fraud protection"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/trustpair.com\/gb\/blog\/the-top-5-social-engineering-techniques-and-how-to-prevent-them\/","url":"https:\/\/trustpair.com\/gb\/blog\/the-top-5-social-engineering-techniques-and-how-to-prevent-them\/","name":"The top 5 social engineering techniques - Trustpair","isPartOf":{"@id":"https:\/\/trustpair.com\/gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/trustpair.com\/gb\/blog\/the-top-5-social-engineering-techniques-and-how-to-prevent-them\/#primaryimage"},"image":{"@id":"https:\/\/trustpair.com\/gb\/blog\/the-top-5-social-engineering-techniques-and-how-to-prevent-them\/#primaryimage"},"thumbnailUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_2164013427.jpg","datePublished":"2024-08-02T13:38:33+00:00","dateModified":"2025-07-15T14:44:03+00:00","description":"Social engineering techniques include phishing, whaling, baiting\u2026 Learn how to spot and prevent social engineering attacks.","breadcrumb":{"@id":"https:\/\/trustpair.com\/gb\/blog\/the-top-5-social-engineering-techniques-and-how-to-prevent-them\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/trustpair.com\/gb\/blog\/the-top-5-social-engineering-techniques-and-how-to-prevent-them\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/trustpair.com\/gb\/blog\/the-top-5-social-engineering-techniques-and-how-to-prevent-them\/#primaryimage","url":"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_2164013427.jpg","contentUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_2164013427.jpg","width":1200,"height":593},{"@type":"BreadcrumbList","@id":"https:\/\/trustpair.com\/gb\/blog\/the-top-5-social-engineering-techniques-and-how-to-prevent-them\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/trustpair.com\/gb\/"},{"@type":"ListItem","position":2,"name":"The top 5 social engineering techniques and how to prevent them"}]},{"@type":"WebSite","@id":"https:\/\/trustpair.com\/gb\/#website","url":"https:\/\/trustpair.com\/gb\/","name":"Trustpair","description":"Leading Payment Fraud Prevention Platform","publisher":{"@id":"https:\/\/trustpair.com\/gb\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/trustpair.com\/gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/trustpair.com\/gb\/#organization","name":"Trustpair","url":"https:\/\/trustpair.com\/gb\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/trustpair.com\/gb\/#\/schema\/logo\/image\/","url":"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg","contentUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg","width":304,"height":73,"caption":"Trustpair"},"image":{"@id":"https:\/\/trustpair.com\/gb\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/trustpair.com\/gb\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034","name":"trustpair_2438","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g","caption":"trustpair_2438"},"sameAs":["http:\/\/trustpair.com"]}]}},"_links":{"self":[{"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/posts\/14982","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/comments?post=14982"}],"version-history":[{"count":2,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/posts\/14982\/revisions"}],"predecessor-version":[{"id":20212,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/posts\/14982\/revisions\/20212"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/media\/14983"}],"wp:attachment":[{"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/media?parent=14982"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/categories?post=14982"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/tags?post=14982"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}