{"id":30537,"date":"2026-01-10T05:21:41","date_gmt":"2026-01-10T05:21:41","guid":{"rendered":"https:\/\/www.adminbyrequest.com\/?page_id=30537"},"modified":"2026-01-24T21:43:35","modified_gmt":"2026-01-24T21:43:35","slug":"glossary-term-social-engineering","status":"publish","type":"page","link":"https:\/\/www.adminbyrequest.com\/en\/glossary-term-social-engineering","title":{"rendered":"Glossary Term: Social Engineering"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"30537\" class=\"elementor elementor-30537\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c00fe01 e-flex e-con-boxed e-con e-parent\" data-id=\"c00fe01\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7661d61 e-con-full e-flex e-con e-child\" data-id=\"7661d61\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4595d5e elementor-widget elementor-widget-heading\" data-id=\"4595d5e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><span style=\"color:black\">Glossary Term:<\/span> Social Engineering<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bf2c6f1 elementor-widget elementor-widget-heading\" data-id=\"bf2c6f1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The ability to connect to and control computers or networks from a different location. While remote access supports flexible work and IT support, traditional methods can create security vulnerabilities without proper just-in-time access controls and session monitoring.\u00a0<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8595a4f elementor-widget elementor-widget-ucaddon_blox_btn_group\" data-id=\"8595a4f\" data-element_type=\"widget\" data-widget_type=\"ucaddon_blox_btn_group.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<!-- start Button Group -->\n<style>\/* widget: Button Group *\/\n\n#uc_blox_btn_group_elementor_8595a4f\n{\n  display:flex;\n  flex-wrap: wrap;\n}\n\n#uc_blox_btn_group_elementor_8595a4f a\n{\n  display:block;\n  text-decoration:none;\n  transition:0.3s;\n\n}\n\n#uc_blox_btn_group_elementor_8595a4f .blox_btn_group_inner\n{\n  display:inline-flex;\n  align-items:center;\n}\n\n#uc_blox_btn_group_elementor_8595a4f .blox_btn_group_inner .ue-btn-icon\n{\n  line-height:1em;\n}\n\n#uc_blox_btn_group_elementor_8595a4f .blox_btn_group_inner .ue-btn-icon svg\n{\n  height:1em;\n  width:1em;\n}\n\n<\/style>\n\n<div id=\"uc_blox_btn_group_elementor_8595a4f\" class=\"blox_btn_group\">\n  <a class=\"elementor-repeater-item-9a60fb7 elementor-animation-shrink\" href=\"\/en\/glossary\" id=\"uc_blox_btn_group_elementor_8595a4f_item1\" >\n  <div class=\"blox_btn_group_inner\">\n        <div class=\"ue-btn-icon\"><i class='fas fa-arrow-left'><\/i><\/div>\n        <div class=\"ue-btn-txt\">Glossary<\/div>\n  <\/div>\n<\/a>\n\n  \n\n\n<\/div>\n<!-- end Button Group -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cc3c531 e-flex e-con-boxed e-con e-parent\" data-id=\"cc3c531\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f4bc8d5 e-con-full e-flex e-con e-child\" data-id=\"f4bc8d5\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-c10463f e-con-full e-flex e-con e-child\" data-id=\"c10463f\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-36e06a0 elementor-widget elementor-widget-text-editor\" data-id=\"36e06a0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW205928833 BCX8\" lang=\"EN-NZ\" xml:lang=\"EN-NZ\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW205928833 BCX8\">Social engineering is a cybersecurity attack method that exploits human psychology and\u00a0<\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW205928833 BCX8\">behavior<\/span><span class=\"NormalTextRun SCXW205928833 BCX8\">\u00a0to trick people into revealing confidential information, granting unauthorized access, or performing actions that compromise security. Unlike technical attacks that target software vulnerabilities, social engineering attacks target the human element of cybersecurity, which is often considered the weakest link in any security system.<\/span><\/span><span class=\"EOP SCXW205928833 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d735424 e-con-full e-flex e-con e-child\" data-id=\"d735424\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ecbc7e elementor-widget elementor-widget-heading\" data-id=\"2ecbc7e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How Social Engineering Works <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7502f86 elementor-widget elementor-widget-text-editor\" data-id=\"7502f86\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">Social engineering attacks succeed by manipulating natural human tendencies like trust, curiosity, fear, and the desire to be helpful. Attackers research their targets to understand organizational structures, relationships, and communication patterns, then craft convincing scenarios that appear legitimate.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">These attacks typically follow a predictable pattern: reconnaissance (gathering information about targets), establishing trust or authority, exploiting emotions or creating urgency, and finally executing the attack once defenses are lowered. The key is that victims voluntarily provide information or access because they believe they&#8217;re helping a legitimate request.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Attackers often combine multiple psychological triggers to increase success rates. They might impersonate authority figures to\u00a0leverage\u00a0respect for hierarchy, create time pressure to prevent careful consideration, or reference shared connections to build credibility.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f588bb5 e-con-full e-flex e-con e-child\" data-id=\"f588bb5\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7f4da5f elementor-widget elementor-widget-heading\" data-id=\"7f4da5f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Common Types of Social Engineering Attacks <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6e23b9f e-con-full e-flex e-con e-child\" data-id=\"6e23b9f\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-020367c elementor-widget elementor-widget-heading\" data-id=\"020367c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Phishing <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a53c28 elementor-widget elementor-widget-text-editor\" data-id=\"2a53c28\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW142975287 BCX8\" lang=\"EN-NZ\" xml:lang=\"EN-NZ\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW142975287 BCX8\">Email-based attacks that appear to come from trusted sources like banks, colleagues, or popular services. These messages typically\u00a0<\/span><span class=\"NormalTextRun SCXW142975287 BCX8\">contain<\/span><span class=\"NormalTextRun SCXW142975287 BCX8\">\u00a0malicious links or\u00a0<\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW142975287 BCX8\">attachments, or<\/span><span class=\"NormalTextRun SCXW142975287 BCX8\">\u00a0request sensitive information like passwords and account details.<\/span><\/span><span class=\"EOP SCXW142975287 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c30e148 e-con-full e-flex e-con e-child\" data-id=\"c30e148\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-80d455b elementor-widget elementor-widget-heading\" data-id=\"80d455b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Spear Phishing <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-54f0d62 elementor-widget elementor-widget-text-editor\" data-id=\"54f0d62\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW31979908 BCX8\" lang=\"EN-NZ\" xml:lang=\"EN-NZ\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW31979908 BCX8\">Highly targeted phishing attacks directed at specific individuals or organizations. Attackers research their targets extensively to create personalized, convincing messages that reference specific details about the victim&#8217;s role, colleagues, or current projects.<\/span><\/span><span class=\"EOP SCXW31979908 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7cf9944 e-con-full e-flex e-con e-child\" data-id=\"7cf9944\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1a4302d elementor-widget elementor-widget-heading\" data-id=\"1a4302d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Pretexting <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0884f4d elementor-widget elementor-widget-text-editor\" data-id=\"0884f4d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW174922235 BCX8\" lang=\"EN-NZ\" xml:lang=\"EN-NZ\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW174922235 BCX8\">Creating false scenarios or identities to extract information. An attacker might pose as IT support requesting password verification, a vendor needing to update account information, or a new employee needing system access.<\/span><\/span><span class=\"EOP SCXW174922235 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8ccbc6b e-con-full e-flex e-con e-child\" data-id=\"8ccbc6b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ec5d897 elementor-widget elementor-widget-heading\" data-id=\"ec5d897\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Baiting <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d476df6 elementor-widget elementor-widget-text-editor\" data-id=\"d476df6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW179421121 BCX8\" lang=\"EN-NZ\" xml:lang=\"EN-NZ\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW179421121 BCX8\">Offering something enticing to spark curiosity and prompt victims to take actions that compromise security. This could be leaving infected USB drives in parking lots or offering free downloads that <\/span><span class=\"NormalTextRun SCXW179421121 BCX8\">contain<\/span><span class=\"NormalTextRun SCXW179421121 BCX8\">\u00a0malware.<\/span><\/span><span class=\"EOP SCXW179421121 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0b5ce8c e-con-full e-flex e-con e-child\" data-id=\"0b5ce8c\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-15371b4 elementor-widget elementor-widget-heading\" data-id=\"15371b4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Quid Pro Quo <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7eb998c elementor-widget elementor-widget-text-editor\" data-id=\"7eb998c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW242657661 BCX8\" lang=\"EN-NZ\" xml:lang=\"EN-NZ\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW242657661 BCX8\">Promising services or benefits in exchange for information or access. Attackers might offer technical support in return for login credentials or promise software upgrades that\u00a0<\/span><span class=\"NormalTextRun AdvancedProofingIssueV2Themed SCXW242657661 BCX8\">actually install<\/span><span class=\"NormalTextRun SCXW242657661 BCX8\">\u00a0malicious code.<\/span><\/span><span class=\"EOP SCXW242657661 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6990858 e-con-full e-flex e-con e-child\" data-id=\"6990858\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0177857 elementor-widget elementor-widget-heading\" data-id=\"0177857\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Tailgating and Piggybacking <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f48ff13 elementor-widget elementor-widget-text-editor\" data-id=\"f48ff13\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW241529021 BCX8\" lang=\"EN-NZ\" xml:lang=\"EN-NZ\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW241529021 BCX8\">Physical security attacks where unauthorized individuals follow legitimate employees into restricted areas. This exploits politeness and the assumption that everyone present belongs there.<\/span><\/span><span class=\"EOP SCXW241529021 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5198e8e e-con-full e-flex e-con e-child\" data-id=\"5198e8e\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-186db13 elementor-widget elementor-widget-heading\" data-id=\"186db13\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Watering Hole Attacks <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-362450f elementor-widget elementor-widget-text-editor\" data-id=\"362450f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW11116519 BCX8\" lang=\"EN-NZ\" xml:lang=\"EN-NZ\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW11116519 BCX8\">Compromising websites <\/span><span class=\"NormalTextRun SCXW11116519 BCX8\">frequently<\/span><span class=\"NormalTextRun SCXW11116519 BCX8\">\u00a0visited by target organizations, then using those sites to deliver malware or steal credentials when employees visit.<\/span><\/span><span class=\"EOP SCXW11116519 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d4d77d2 e-con-full e-flex e-con e-child\" data-id=\"d4d77d2\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c7365c5 elementor-widget elementor-widget-heading\" data-id=\"c7365c5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why is Social Engineering so Effective? <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-94c5e30 elementor-widget elementor-widget-text-editor\" data-id=\"94c5e30\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">Social engineering attacks exploit fundamental aspects of human nature that persist regardless of technical security measures. People naturally want to be helpful, especially when approached by someone who\u00a0appears to be\u00a0in authority or distress.\u00a0We&#8217;re\u00a0also conditioned to respond quickly to urgent requests, which prevents the careful consideration that might reveal inconsistencies.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Trust plays\u00a0a central role\u00a0in human interactions, and attackers exploit this by\u00a0establishing\u00a0credibility through shared references, organizational knowledge, or professional appearance. Once trust is\u00a0established, people are much more likely to\u00a0comply with\u00a0requests without questioning their legitimacy.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Additionally, many employees lack awareness of how social engineering works or\u00a0fail to\u00a0recognize attack attempts in progress. Technical security training often focuses on software and hardware threats while neglecting the human factors that enable many successful breaches.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-759a804 e-con-full e-flex e-con e-child\" data-id=\"759a804\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a854229 elementor-widget elementor-widget-heading\" data-id=\"a854229\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How to Recognize Social Engineering Attempts <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e7f2b0 elementor-widget elementor-widget-text-editor\" data-id=\"5e7f2b0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">Several warning signs can help\u00a0identify\u00a0potential social engineering attacks:<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><ul><li><b><span data-contrast=\"auto\">Urgency and pressure<\/span><\/b><span data-contrast=\"auto\">: Legitimate requests rarely require immediate action without proper verification procedures<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><li><b><span data-contrast=\"auto\">Unusual communication methods<\/span><\/b><span data-contrast=\"auto\">: Unexpected phone calls or emails requesting sensitive information, especially from unfamiliar contacts<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><li><b><span data-contrast=\"auto\">Information fishing<\/span><\/b><span data-contrast=\"auto\">: Questions that seem designed to gather details about systems, procedures, or personnel rather than\u00a0accomplish\u00a0specific business tasks<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><li><b><span data-contrast=\"auto\">Authority claims<\/span><\/b><span data-contrast=\"auto\">: Individuals claiming positions or relationships that seem inconsistent with normal organizational procedures<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><li><b><span data-contrast=\"auto\">Emotional manipulation<\/span><\/b><span data-contrast=\"auto\">: Appeals to fear, curiosity, sympathy, or other emotions designed to bypass rational decision-making<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><li><b><span data-contrast=\"auto\">Requests for secrecy<\/span><\/b><span data-contrast=\"auto\">: Asking victims not to verify requests with supervisors or colleagues<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><\/ul><p><span data-contrast=\"auto\">For\u00a0a deeper dive into this topic, see\u00a0our\u00a0<\/span><a href=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/dont-get-hooked-10-social-engineering-indicators\"><span data-contrast=\"none\">blog on social engineering indicators<\/span><\/a><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dcca645 e-con-full e-flex e-con e-child\" data-id=\"dcca645\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d1cd7ca elementor-widget elementor-widget-heading\" data-id=\"d1cd7ca\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Defending Against Social Engineering <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-516304b elementor-widget elementor-widget-text-editor\" data-id=\"516304b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">Effective protection against social engineering requires a combination of policies, training, and technical controls:<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><ol><li><b><span data-contrast=\"auto\">Security Awareness Training<\/span><\/b><span data-contrast=\"auto\">\u2013<\/span><b><span data-contrast=\"auto\">\u00a0<\/span><\/b><span data-contrast=\"auto\">Regular education programs that teach employees to recognize common attack methods and provide clear procedures for verifying requests. Training should include realistic scenarios and emphasize that questioning suspicious requests is encouraged, not discouraged.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><li><b><span data-contrast=\"auto\">Verification Procedures<\/span><\/b><span data-contrast=\"auto\">\u2013<\/span><b><span data-contrast=\"auto\">\u00a0<\/span><\/b><span data-contrast=\"auto\">Establish clear protocols for verifying the identity of individuals requesting sensitive information or system access. This might include callback procedures, multi-person authorization requirements, or specific authentication methods.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><li><b><span data-contrast=\"auto\">Information Classification<\/span><\/b><span data-contrast=\"auto\">\u2013\u00a0Limit the amount of organizational information available publicly through websites, social media, and other sources that attackers use for reconnaissance.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><li><b><span data-contrast=\"auto\">Technical Controls<\/span><\/b><span data-contrast=\"auto\">\u2013<\/span><b><span data-contrast=\"auto\">\u00a0<\/span><\/b><span data-contrast=\"auto\">Implement security measures that reduce the impact of successful social engineering attacks, such as multi-factor authentication, email filtering, and endpoint protection systems.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><li><b><span data-contrast=\"auto\">Incident Response Planning<\/span><\/b><span data-contrast=\"auto\">\u2013\u00a0Develop procedures for responding when employees suspect\u00a0they&#8217;ve\u00a0been targeted by social engineering attempts, including immediate containment measures and investigation protocols.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><\/ol><p><span data-contrast=\"auto\">Social engineering\u00a0remains\u00a0one of the most persistent and effective attack methods because it targets human nature rather than technical systems. Organizations that acknowledge this reality and invest in comprehensive human-focused security measures alongside technical protections create much stronger overall security postures.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b6c9445 elementor-align-right elementor-mobile-align-justify elementor-widget elementor-widget-button\" data-id=\"b6c9445\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-shrink\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-arrow-up\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Back to top<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Glossary Term: Social Engineering The ability to connect to and control computers or networks from a different location. While remote access supports flexible work and IT support, traditional methods can create security vulnerabilities without proper just-in-time access controls and session monitoring.\u00a0 Glossary Social engineering is a cybersecurity attack method that exploits human psychology and\u00a0behavior\u00a0to trick [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"ppma_author":[402],"class_list":["post-30537","page","type-page","status-publish","hentry","entry"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.6.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"Glossary Term: Social Engineering The ability to connect to and control computers or networks from a different location. While remote access supports flexible work and IT support, traditional methods can create security vulnerabilities without proper just-in-time access controls and session monitoring. Glossary Social engineering is a cybersecurity attack method that exploits human psychology and behavior to trick\" \/>\n\t<meta name=\"robots\" content=\"max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n\t<link rel=\"canonical\" href=\"https:\/\/www.adminbyrequest.com\/en\/glossary-term-social-engineering\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.6.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Admin By Request \u00bb Local Admin Rights, Managed.\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Glossary Term: Social Engineering \u00bb Admin By Request\" \/>\n\t\t<meta property=\"og:description\" content=\"Glossary Term: Social Engineering The ability to connect to and control computers or networks from a different location. While remote access supports flexible work and IT support, traditional methods can create security vulnerabilities without proper just-in-time access controls and session monitoring. Glossary Social engineering is a cybersecurity attack method that exploits human psychology and behavior to trick\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.adminbyrequest.com\/en\/glossary-term-social-engineering\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2026-01-10T05:21:41+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2026-01-24T21:43:35+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/adminbyrequest\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Glossary Term: Social Engineering \u00bb Admin By Request\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Glossary Term: Social Engineering The ability to connect to and control computers or networks from a different location. While remote access supports flexible work and IT support, traditional methods can create security vulnerabilities without proper just-in-time access controls and session monitoring. Glossary Social engineering is a cybersecurity attack method that exploits human psychology and behavior to trick\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/glossary-term-social-engineering#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/glossary-term-social-engineering#listItem\",\"name\":\"Glossary Term: Social Engineering\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/glossary-term-social-engineering#listItem\",\"position\":2,\"name\":\"Glossary Term: Social Engineering\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"name\":\"Home\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\",\"name\":\"Admin By Request\",\"description\":\"Local Admin Rights, Managed.\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"telephone\":\"+12622994600\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Circle-Tick-24.svg\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/glossary-term-social-engineering\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/glossary-term-social-engineering\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/adminbyrequest\",\"https:\\\/\\\/twitter.com\\\/AdminByRequest\",\"https:\\\/\\\/www.instagram.com\\\/AdminByRequest\\\/\",\"https:\\\/\\\/www.tiktok.com\\\/@adminbyrequest\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCwq1wlbT9m_z3YH-EPaZqKw\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/adminbyrequest\\\/\"]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/glossary-term-social-engineering#webpage\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/glossary-term-social-engineering\",\"name\":\"Glossary Term: Social Engineering \\u00bb Admin By Request\",\"description\":\"Glossary Term: Social Engineering The ability to connect to and control computers or networks from a different location. While remote access supports flexible work and IT support, traditional methods can create security vulnerabilities without proper just-in-time access controls and session monitoring. Glossary Social engineering is a cybersecurity attack method that exploits human psychology and behavior to trick\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/glossary-term-social-engineering#breadcrumblist\"},\"datePublished\":\"2026-01-10T05:21:41+00:00\",\"dateModified\":\"2026-01-24T21:43:35+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"name\":\"Admin By Request\",\"alternateName\":\"ABR\",\"description\":\"Local Admin Rights, Managed.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<script type=\"text\/javascript\">\n\t\t\t(function(c,l,a,r,i,t,y){\n\t\t\tc[a]=c[a]||function(){(c[a].q=c[a].q||[]).push(arguments)};t=l.createElement(r);t.async=1;\n\t\t\tt.src=\"https:\/\/www.clarity.ms\/tag\/\"+i+\"?ref=aioseo\";y=l.getElementsByTagName(r)[0];y.parentNode.insertBefore(t,y);\n\t\t})(window, document, \"clarity\", \"script\", \"n4woz8og40\");\n\t\t<\/script>\n\t\t<script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src='https:\/\/www.googletagmanager.com\/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f);})(window,document,'script','dataLayer',\"GTM-PGQ6572W\");<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Glossary Term: Social Engineering \u00bb Admin By Request<\/title>\n\n","aioseo_head_json":{"title":"Glossary Term: Social Engineering \u00bb Admin By Request","description":"Glossary Term: Social Engineering The ability to connect to and control computers or networks from a different location. While remote access supports flexible work and IT support, traditional methods can create security vulnerabilities without proper just-in-time access controls and session monitoring. Glossary Social engineering is a cybersecurity attack method that exploits human psychology and behavior to trick","canonical_url":"https:\/\/www.adminbyrequest.com\/en\/glossary-term-social-engineering","robots":"max-snippet:-1, max-image-preview:large, max-video-preview:-1","keywords":"","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BreadcrumbList","@id":"https:\/\/www.adminbyrequest.com\/en\/glossary-term-social-engineering#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","position":1,"name":"Home","item":"https:\/\/www.adminbyrequest.com\/en","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/glossary-term-social-engineering#listItem","name":"Glossary Term: Social Engineering"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/glossary-term-social-engineering#listItem","position":2,"name":"Glossary Term: Social Engineering","previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","name":"Home"}}]},{"@type":"Organization","@id":"https:\/\/www.adminbyrequest.com\/en\/#organization","name":"Admin By Request","description":"Local Admin Rights, Managed.","url":"https:\/\/www.adminbyrequest.com\/en\/","telephone":"+12622994600","logo":{"@type":"ImageObject","url":"\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","@id":"https:\/\/www.adminbyrequest.com\/en\/glossary-term-social-engineering\/#organizationLogo"},"image":{"@id":"https:\/\/www.adminbyrequest.com\/en\/glossary-term-social-engineering\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/adminbyrequest","https:\/\/twitter.com\/AdminByRequest","https:\/\/www.instagram.com\/AdminByRequest\/","https:\/\/www.tiktok.com\/@adminbyrequest","https:\/\/www.youtube.com\/channel\/UCwq1wlbT9m_z3YH-EPaZqKw","https:\/\/www.linkedin.com\/company\/adminbyrequest\/"]},{"@type":"WebPage","@id":"https:\/\/www.adminbyrequest.com\/en\/glossary-term-social-engineering#webpage","url":"https:\/\/www.adminbyrequest.com\/en\/glossary-term-social-engineering","name":"Glossary Term: Social Engineering \u00bb Admin By Request","description":"Glossary Term: Social Engineering The ability to connect to and control computers or networks from a different location. While remote access supports flexible work and IT support, traditional methods can create security vulnerabilities without proper just-in-time access controls and session monitoring. Glossary Social engineering is a cybersecurity attack method that exploits human psychology and behavior to trick","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#website"},"breadcrumb":{"@id":"https:\/\/www.adminbyrequest.com\/en\/glossary-term-social-engineering#breadcrumblist"},"datePublished":"2026-01-10T05:21:41+00:00","dateModified":"2026-01-24T21:43:35+00:00"},{"@type":"WebSite","@id":"https:\/\/www.adminbyrequest.com\/en\/#website","url":"https:\/\/www.adminbyrequest.com\/en\/","name":"Admin By Request","alternateName":"ABR","description":"Local Admin Rights, Managed.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"}}]},"og:locale":"en_US","og:site_name":"Admin By Request \u00bb Local Admin Rights, Managed.","og:type":"article","og:title":"Glossary Term: Social Engineering \u00bb Admin By Request","og:description":"Glossary Term: Social Engineering The ability to connect to and control computers or networks from a different location. While remote access supports flexible work and IT support, traditional methods can create security vulnerabilities without proper just-in-time access controls and session monitoring. Glossary Social engineering is a cybersecurity attack method that exploits human psychology and behavior to trick","og:url":"https:\/\/www.adminbyrequest.com\/en\/glossary-term-social-engineering","og:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","og:image:secure_url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","article:published_time":"2026-01-10T05:21:41+00:00","article:modified_time":"2026-01-24T21:43:35+00:00","article:publisher":"https:\/\/www.facebook.com\/adminbyrequest","twitter:card":"summary_large_image","twitter:site":"@AdminByRequest","twitter:title":"Glossary Term: Social Engineering \u00bb Admin By Request","twitter:description":"Glossary Term: Social Engineering The ability to connect to and control computers or networks from a different location. While remote access supports flexible work and IT support, traditional methods can create security vulnerabilities without proper just-in-time access controls and session monitoring. Glossary Social engineering is a cybersecurity attack method that exploits human psychology and behavior to trick","twitter:creator":"@AdminByRequest","twitter:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg"},"aioseo_meta_data":{"post_id":"30537","title":"#post_title #separator_sa #site_title","description":"#post_content","keywords":null,"keyphrases":{"focus":{"keyphrase":"","score":0,"analysis":{"keyphraseInTitle":{"score":0,"maxScore":9,"error":1}}},"additional":[]},"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":null,"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"WebPage","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":"2026-01-24 22:21:09","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":null,"ai":{"faqs":[],"keyPoints":[],"titles":[],"descriptions":[],"socialPosts":{"email":[],"linkedin":[],"twitter":[],"facebook":[],"instagram":[]}},"created":"2026-01-10 04:58:33","updated":"2026-01-24 22:21:09"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tGlossary Term: Social Engineering\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.adminbyrequest.com\/en"},{"label":"Glossary Term: Social Engineering","link":"https:\/\/www.adminbyrequest.com\/en\/glossary-term-social-engineering"}],"_links":{"self":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/pages\/30537","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/comments?post=30537"}],"version-history":[{"count":7,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/pages\/30537\/revisions"}],"predecessor-version":[{"id":30583,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/pages\/30537\/revisions\/30583"}],"wp:attachment":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media?parent=30537"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/ppma_author?post=30537"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}