Hackers use these common tactics to prey on your humanity. Here's what you need to know to keep you, your users, and your business safe. Credit: SpiffyJ / Getty Images What will the cause of your next security breach?Will it be your firewall? Will it be your VPN? Will it be your website?Nope.Chances are, your next security breach will be caused by hackers exploiting someone within your organization. In just the last two months, a single, simple phishing scam targeted seven organizations, gaining access to W2 information. And business email compromise attacks, in particular, are growing fast and hard to defend against.The fact is, it’s “easier to trick someone into opening an email and exploiting a vulnerability that way, or convincing an unsuspecting assistant to provide a few useful bits of information, than it is to directly attack a web application or network connection,” writes George V. Hulme in his Social Engineering Survival Guide. In person, by phone, or by email or other digital means, whatever the method of communication, hackers are using highly targeted tactics to take advantage of our feelings, emotions and relationships.But there are some simple things you can do to take the target off your back… starting with building your (and your users’) social engineering smarts.This new infographic from cloud file sharing provider SmartFile, clearly explains 18 common social engineering tactics so you can spot them in the wild. SmartFile.com Related content brandpost How an integrated platform approach improves OT security By Richard Springer Sep 26, 2023 5 mins Security news Teachers urged to enter schoolgirls into UK’s flagship cybersecurity contest CyberFirst Girls aims to introduce girls to cybersecurity, increase diversity, and address the much-maligned skills shortage in the sector. By Michael Hill Sep 26, 2023 4 mins Back to School Education Industry IT Training news CREST, IASME to deliver UK NCSC’s Cyber Incident Exercising scheme CIE scheme aims to help organisations find quality service providers that can advise and support them in practising cyber incident response plans. By Michael Hill Sep 26, 2023 3 mins IT Governance Frameworks Incident Response Data and Information Security news Baffle releases encryption solution to secure data for generative AI Solution uses the advanced encryption standard algorithm to encrypt sensitive data throughout the generative AI pipeline. By Michael Hill Sep 26, 2023 3 mins Encryption Generative AI Data and Information Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe