Social engineering techniques — including phishing, smishing, vishing, and in-person attacks — take advantage of a victim’s trust in order to evade perimeter defenses and steal data, access confidential networks, and could lead to financial loss, reputational loss oe compromised credentials and accounts. This could be the first initial steps of realistic, comprehensive attack by an attacker which over the years have increasingly become more convincing and successful.
Download our full defence guide to get familiar with all the Social Engineering techniques.