{"id":29547,"date":"2025-05-12T15:13:38","date_gmt":"2025-05-12T13:13:38","guid":{"rendered":"https:\/\/dev.evok.com\/all-you-need-to-know-about-social-engineering-in-2023\/"},"modified":"2025-05-12T15:13:39","modified_gmt":"2025-05-12T13:13:39","slug":"all-you-need-to-know-about-social-engineering-in-2023","status":"publish","type":"post","link":"https:\/\/evok.com\/en\/all-you-need-to-know-about-social-engineering-in-2023\/","title":{"rendered":"All you need to know about social engineering in 2023"},"content":{"rendered":"\n<p>Social engineering is a term used to describe a wide range of malicious activities carried out through human interaction. It uses psychological manipulation to induce users to commit security errors or give out sensitive information. <\/p>\n\n<p>By understanding social engineering attacks, and recognizing that true protection against them requires both people AND technology, you can protect your organization from the consequences of these types of practices.<\/p>\n\n<div class=\"wp-block-yoast-seo-table-of-contents yoast-table-of-contents\"><h2>Table of contents<\/h2><ul><li><a href=\"#h-quels-sont-les-types-d-attaques-de-social-engineering-les-plus-courants\" data-level=\"2\">What are the most common types of social engineering attack?<\/a><ul><li><a href=\"#h-le-phishing\" data-level=\"3\">Phishing<\/a><\/li><li><a href=\"#h-le-baiting\" data-level=\"3\">Baiting<\/a><\/li><li><a href=\"#h-le-pretexting\" data-level=\"3\">Pretexting<\/a><\/li><\/ul><\/li><li><a href=\"#h-comment-contrer-les-pratiques-de-social-engineering\" data-level=\"2\">How to counter social engineering practices?<\/a><\/li><\/ul><\/div>\n\n<h2 class=\"wp-block-heading\" id=\"h-quels-sont-les-types-d-attaques-de-social-engineering-les-plus-courants\">What are the most common types of social engineering attack?<\/h2>\n\n<p>Here are some of the most common social engineering techniques:<\/p>\n\n<h3 class=\"wp-block-heading\" id=\"h-le-phishing\">Phishing<\/h3>\n\n<p>Phishing is the most common social engineering tactic.<\/p>\n\n<p>This is done by means of an e-mail, a website, an Internet ad or a video to incite its victims to act. The people behind the attack may pose as a bank, delivery service or government agency, or they may be more specific and appear to come from a department within the victim's company (human resources, IT, sales...). By the way, phishing e-mails, which often look innocent, include a call to action. The victim will be asked to click on a URL, which will then take them to a fraudulent website containing malware.   <\/p>\n\n<p>Although even the most unsuspecting users are aware of this practice, it continues to wreak havoc. All the more so as cybercriminals are making much greater efforts to ensure that they are well-designed and unsuspected. <\/p>\n\n<p>Phishing variants include Spear Phishing, which targets a specific demographic, such as employees of a particular company or CFOs in a particular industry. There's also Whaling, which targets executives or high-level employees. <\/p>\n\n<h3 class=\"wp-block-heading\" id=\"h-le-baiting\">Baiting<\/h3>\n\n<p>Baiting is another fairly common form of social engineering. It consists in luring the victim with a tempting offer (free music or games). The attacker hopes that the password used to log in and obtain the free digital gifts is a password used on larger sites. And if it's unique, the attacker will still be able to sell it on the dark web. In the corporate world, a baiting attack is most likely to consist of a USB key left in a common place. When someone finds it and plugs it into the company network to see who it belongs to, they download malware.     <\/p>\n\n<h3 class=\"wp-block-heading\" id=\"h-le-pretexting\">Pretexting<\/h3>\n\n<p>As its name suggests, \"pretexting\" is a form of social engineering in which the attacker presents a pretext to gain the victim's trust. The attacker may pose as an investor, HR representative or other \"legitimate\" source. This type of scenario generally plays on the victim's emotions, using a sense of urgency or the element of surprise.  <\/p>\n\n<h2 class=\"wp-block-heading\" id=\"h-comment-contrer-les-pratiques-de-social-engineering\">How to counter social engineering?<\/h2>\n\n<p>To overcome social engineering threats, it is essential to focus on both the human and the hardware\/software side.<\/p>\n\n<p>Let's start with the human side, which is the point of attack for cyber criminals specializing in social engineering! With this in mind, security training remains the best way to avoid falling victim to an attack. As part of their security awareness programs, organizations should continue to remind their employees of the following common practices:  <\/p>\n\n<ul class=\"wp-block-list\">\n<li>Never click on links or attachments sent by people you don't know.<\/li>\n\n\n\n<li>Always check the web address of legitimate sites, even if it means typing it into the browser manually.<\/li>\n\n\n\n<li>Check for spelling mistakes or inappropriate domains in a link (for example, an address that should end in .gov ends in .com).<\/li>\n\n\n\n<li>Never give out their username, password, date of birth, financial data or other personal information in response to an e-mail or phone call.<\/li>\n<\/ul>\n\n<p>Let's move on to the technological side! It is imperative to :   <\/p>\n\n<ul class=\"wp-block-list\">\n<li>Keep your anti-malware and anti-virus software up to date to secure your network and data.<\/li>\n\n\n\n<li>Adopt a <a href=\"https:\/\/evok.com\/fr\/it-maintenance\/maintenance-et-gestion-dinfrastructure\/\">preventive IT maintenance<\/a> approach that analyzes the structure and behavior of web pages to identify potential threats.<\/li>\n<\/ul>\n\n<p>And above all, keep up to date with all the latest developments in cybersecurity by becoming a regular reader of our blog ;-)!  <\/p>\n","protected":false},"excerpt":{"rendered":"<p>By understanding social engineering attacks, and recognizing that true protection against them requires both people AND technology, you can protect your organization from the consequences of these types of practices.<\/p>\n","protected":false},"author":12,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[108,106],"tags":[112],"class_list":["post-29547","post","type-post","status-publish","format-standard","hentry","category-blog-en","category-cybersecurity","tag-cyber-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Social engineering: everything you need to know in 2023<\/title>\n<meta name=\"description\" content=\"Discover the different types of social engineering and how to combat these attacks that threaten your cybersecurity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/evok.com\/en\/all-you-need-to-know-about-social-engineering-in-2023\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"All you need to know about social engineering in 2023\" \/>\n<meta property=\"og:description\" content=\"Discover the different types of social engineering and how to combat these attacks that threaten your cybersecurity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/evok.com\/en\/all-you-need-to-know-about-social-engineering-in-2023\/\" \/>\n<meta property=\"og:site_name\" content=\"EVOK Informatique\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-12T13:13:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-12T13:13:39+00:00\" \/>\n<meta name=\"author\" content=\"Florian Bourqui\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Florian Bourqui\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/evok.com\\\/en\\\/all-you-need-to-know-about-social-engineering-in-2023\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/evok.com\\\/en\\\/all-you-need-to-know-about-social-engineering-in-2023\\\/\"},\"author\":{\"name\":\"Florian Bourqui\",\"@id\":\"https:\\\/\\\/evok.com\\\/en\\\/#\\\/schema\\\/person\\\/03eaff51f52c8e29668cc58c6701f122\"},\"headline\":\"All you need to know about social engineering in 2023\",\"datePublished\":\"2025-05-12T13:13:38+00:00\",\"dateModified\":\"2025-05-12T13:13:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/evok.com\\\/en\\\/all-you-need-to-know-about-social-engineering-in-2023\\\/\"},\"wordCount\":677,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/evok.com\\\/en\\\/#organization\"},\"keywords\":[\"cyber security\"],\"articleSection\":[\"Blog\",\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/evok.com\\\/en\\\/all-you-need-to-know-about-social-engineering-in-2023\\\/#respond\"]}],\"accessibilityFeature\":[\"tableOfContents\"]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/evok.com\\\/en\\\/all-you-need-to-know-about-social-engineering-in-2023\\\/\",\"url\":\"https:\\\/\\\/evok.com\\\/en\\\/all-you-need-to-know-about-social-engineering-in-2023\\\/\",\"name\":\"Social engineering: everything you need to know in 2023\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/evok.com\\\/en\\\/#website\"},\"datePublished\":\"2025-05-12T13:13:38+00:00\",\"dateModified\":\"2025-05-12T13:13:39+00:00\",\"description\":\"Discover the different types of social engineering and how to combat these attacks that threaten your cybersecurity.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/evok.com\\\/en\\\/all-you-need-to-know-about-social-engineering-in-2023\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/evok.com\\\/en\\\/all-you-need-to-know-about-social-engineering-in-2023\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/evok.com\\\/en\\\/all-you-need-to-know-about-social-engineering-in-2023\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/evok.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"All you need to know about social engineering in 2023\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/evok.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/evok.com\\\/en\\\/\",\"name\":\"EVOK Informatique\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/evok.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/evok.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/evok.com\\\/en\\\/#organization\",\"name\":\"EVOK - Altern8 SA\",\"alternateName\":\"EVOK\",\"url\":\"https:\\\/\\\/evok.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/evok.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/evok.com\\\/media\\\/Logo.svg-4.png\",\"contentUrl\":\"https:\\\/\\\/evok.com\\\/media\\\/Logo.svg-4.png\",\"width\":300,\"height\":140,\"caption\":\"EVOK - Altern8 SA\"},\"image\":{\"@id\":\"https:\\\/\\\/evok.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/evok\\\/\"],\"description\":\"EVOK \u2013 Altern8 SA est une soci\u00e9t\u00e9 suisse d\u2019infog\u00e9rance et de services cloud bas\u00e9e \u00e0 Fribourg. Nous aidons les PME \u00e0 s\u00e9curiser et moderniser leur informatique: cloud h\u00e9berg\u00e9 en Suisse, cybers\u00e9curit\u00e9 op\u00e9rationnelle, Microsoft 365, t\u00e9l\u00e9phonie\\\/VoIP, r\u00e9seaux et support utilisateur. En tant que membre du groupe Sequotech, nous combinons expertise locale, infrastructures souveraines et engagements de service mesurables (SLA). Notre approche est pragmatique: architecture simple, co\u00fbts lisibles, et un point de contact unique pour votre IT au quotidien.\",\"email\":\"info@evok.com\",\"telephone\":\"+41 26 309 27 27\",\"legalName\":\"Altern8 SA\",\"foundingDate\":\"1998-01-01\",\"vatID\":\"CHE-105.467.972 TVA\",\"taxID\":\"CHE-105.467.972\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"11\",\"maxValue\":\"50\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/evok.com\\\/en\\\/#\\\/schema\\\/person\\\/03eaff51f52c8e29668cc58c6701f122\",\"name\":\"Florian Bourqui\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Social engineering: everything you need to know in 2023","description":"Discover the different types of social engineering and how to combat these attacks that threaten your cybersecurity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/evok.com\/en\/all-you-need-to-know-about-social-engineering-in-2023\/","og_locale":"en_US","og_type":"article","og_title":"All you need to know about social engineering in 2023","og_description":"Discover the different types of social engineering and how to combat these attacks that threaten your cybersecurity.","og_url":"https:\/\/evok.com\/en\/all-you-need-to-know-about-social-engineering-in-2023\/","og_site_name":"EVOK Informatique","article_published_time":"2025-05-12T13:13:38+00:00","article_modified_time":"2025-05-12T13:13:39+00:00","author":"Florian Bourqui","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Florian Bourqui","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/evok.com\/en\/all-you-need-to-know-about-social-engineering-in-2023\/#article","isPartOf":{"@id":"https:\/\/evok.com\/en\/all-you-need-to-know-about-social-engineering-in-2023\/"},"author":{"name":"Florian Bourqui","@id":"https:\/\/evok.com\/en\/#\/schema\/person\/03eaff51f52c8e29668cc58c6701f122"},"headline":"All you need to know about social engineering in 2023","datePublished":"2025-05-12T13:13:38+00:00","dateModified":"2025-05-12T13:13:39+00:00","mainEntityOfPage":{"@id":"https:\/\/evok.com\/en\/all-you-need-to-know-about-social-engineering-in-2023\/"},"wordCount":677,"commentCount":0,"publisher":{"@id":"https:\/\/evok.com\/en\/#organization"},"keywords":["cyber security"],"articleSection":["Blog","Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/evok.com\/en\/all-you-need-to-know-about-social-engineering-in-2023\/#respond"]}],"accessibilityFeature":["tableOfContents"]},{"@type":"WebPage","@id":"https:\/\/evok.com\/en\/all-you-need-to-know-about-social-engineering-in-2023\/","url":"https:\/\/evok.com\/en\/all-you-need-to-know-about-social-engineering-in-2023\/","name":"Social engineering: everything you need to know in 2023","isPartOf":{"@id":"https:\/\/evok.com\/en\/#website"},"datePublished":"2025-05-12T13:13:38+00:00","dateModified":"2025-05-12T13:13:39+00:00","description":"Discover the different types of social engineering and how to combat these attacks that threaten your cybersecurity.","breadcrumb":{"@id":"https:\/\/evok.com\/en\/all-you-need-to-know-about-social-engineering-in-2023\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/evok.com\/en\/all-you-need-to-know-about-social-engineering-in-2023\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/evok.com\/en\/all-you-need-to-know-about-social-engineering-in-2023\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/evok.com\/en\/"},{"@type":"ListItem","position":2,"name":"All you need to know about social engineering in 2023"}]},{"@type":"WebSite","@id":"https:\/\/evok.com\/en\/#website","url":"https:\/\/evok.com\/en\/","name":"EVOK Informatique","description":"","publisher":{"@id":"https:\/\/evok.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/evok.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/evok.com\/en\/#organization","name":"EVOK - Altern8 SA","alternateName":"EVOK","url":"https:\/\/evok.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/evok.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/evok.com\/media\/Logo.svg-4.png","contentUrl":"https:\/\/evok.com\/media\/Logo.svg-4.png","width":300,"height":140,"caption":"EVOK - Altern8 SA"},"image":{"@id":"https:\/\/evok.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/evok\/"],"description":"EVOK \u2013 Altern8 SA est une soci\u00e9t\u00e9 suisse d\u2019infog\u00e9rance et de services cloud bas\u00e9e \u00e0 Fribourg. Nous aidons les PME \u00e0 s\u00e9curiser et moderniser leur informatique: cloud h\u00e9berg\u00e9 en Suisse, cybers\u00e9curit\u00e9 op\u00e9rationnelle, Microsoft 365, t\u00e9l\u00e9phonie\/VoIP, r\u00e9seaux et support utilisateur. En tant que membre du groupe Sequotech, nous combinons expertise locale, infrastructures souveraines et engagements de service mesurables (SLA). Notre approche est pragmatique: architecture simple, co\u00fbts lisibles, et un point de contact unique pour votre IT au quotidien.","email":"info@evok.com","telephone":"+41 26 309 27 27","legalName":"Altern8 SA","foundingDate":"1998-01-01","vatID":"CHE-105.467.972 TVA","taxID":"CHE-105.467.972","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"11","maxValue":"50"}},{"@type":"Person","@id":"https:\/\/evok.com\/en\/#\/schema\/person\/03eaff51f52c8e29668cc58c6701f122","name":"Florian Bourqui"}]}},"_links":{"self":[{"href":"https:\/\/evok.com\/en\/wp-json\/wp\/v2\/posts\/29547","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/evok.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/evok.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/evok.com\/en\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/evok.com\/en\/wp-json\/wp\/v2\/comments?post=29547"}],"version-history":[{"count":1,"href":"https:\/\/evok.com\/en\/wp-json\/wp\/v2\/posts\/29547\/revisions"}],"predecessor-version":[{"id":29549,"href":"https:\/\/evok.com\/en\/wp-json\/wp\/v2\/posts\/29547\/revisions\/29549"}],"wp:attachment":[{"href":"https:\/\/evok.com\/en\/wp-json\/wp\/v2\/media?parent=29547"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/evok.com\/en\/wp-json\/wp\/v2\/categories?post=29547"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/evok.com\/en\/wp-json\/wp\/v2\/tags?post=29547"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}