
What is Social Engineering?
With the wealth of information about business and people available online, it is little wonder that criminals can and do use it for malicious purposes.

Phishing is a form of social engineering. It involves sending messages that appear legitimate but are designed to manipulate people into taking an action; that might be clicking a link, opening an attachment, sharing information, or making a payment.
Phishing targets people, not systems.

Phishing messages are designed to blend into normal work and daily life. Things to look out for, include:
Don't think it's just your inbox that's under fire; phishing attempts can arrive via email, text messages (smishing), phone calls or voicemails (vishing), collaboration tools like Teams, or social media.
Phishing continues to work so well because it exploits normal human behaviour:
Strong technical controls can reduce risk, but they can't remove it entirely.
Phishing is one of the most common starting points for data breaches, ransomware incidents, fraud and financial loss, and account compromise. Many serious cyber incidents begin with a single message that looks routine.
Good phishing awareness focuses on pause and verification, not blame.
Here's what you should do:
Cyber criminals will take the path of least resistance, and manipulating human behaviour is the easiest. Everyone is responsible for not falling victim to social engineering.

With the wealth of information about business and people available online, it is little wonder that criminals can and do use it for malicious purposes.

There has been a recent uptick in the number of phishing campaigns happening over Microsoft Teams. Though there is a lack of publicly available information on attempts that have happened in the UK, Microsoft has issued an urgent alert warning of a highly sophisticated phishing campaign attributed to the well-known threat actor group Storm-0324.

Human error contributes to up to 95% of data breaches, according to a recent 2024 study by Mimecast. Despite sophisticated cybersecurity tools, a single misdirected email, weak password, or accidental data exposure can lead to severe financial and reputational damage.