Hackers use these common tactics to prey on your humanity. Here's what you need to know to keep you, your users, and your business safe. Credit: SpiffyJ / Getty Images What will the cause of your next security breach?Will it be your firewall? Will it be your VPN? Will it be your website?Nope. Chances are, your next security breach will be caused by hackers exploiting someone within your organization. In just the last two months, a single, simple phishing scam targeted seven organizations, gaining access to W2 information. And business email compromise attacks, in particular, are growing fast and hard to defend against.The fact is, it’s “easier to trick someone into opening an email and exploiting a vulnerability that way, or convincing an unsuspecting assistant to provide a few useful bits of information, than it is to directly attack a web application or network connection,” writes George V. Hulme in his Social Engineering Survival Guide. In person, by phone, or by email or other digital means, whatever the method of communication, hackers are using highly targeted tactics to take advantage of our feelings, emotions and relationships.But there are some simple things you can do to take the target off your back… starting with building your (and your users’) social engineering smarts.This new infographic from cloud file sharing provider SmartFile, clearly explains 18 common social engineering tactics so you can spot them in the wild. SmartFile.com Related content news analysis SEC rule for finance firms boosts disclosure requirements Amendments to Regulation S-P requires broker-dealers, investment companies, registered investment advisers, and transfer agents to disclose incidents to customers. By Evan Schuman May 17, 2024 5 mins Data Breach Financial Services Industry Data Privacy feature DDoS attacks: Definition, examples, and techniques Distributed denial of service (DDoS) attacks have been part of the criminal toolbox for over twenty years, and they’re only growing more prevalent and stronger. By Josh Fruhlinger May 17, 2024 10 mins DDoS Cyberattacks news FCC proposes BGP security measures Protecting the Border Gateway Protocol is as important as protecting the border. By Gyana Swain May 17, 2024 1 min Regulation Network Security news US AI experts targeted in cyberespionage campaign using SugarGh0st RAT Threat actors use phishing techniques to obtain non-public information about generative artificial intelligence. By Lucian Constantin May 16, 2024 4 mins Phishing Data and Information Security PODCASTS VIDEOS RESOURCES EVENTS SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe