Cybersecurity Awareness Month Week 2 2025 - Social Engineering & Human Risk

Body

Social engineering is the use of deception and manipulation to trick people into giving up sensitive information, access, or money. Instead of hacking code, attackers hack human behavior — trust, urgency, curiosity, fear, or helpfulness.

 

Common tactics you might see:

  • Phishing: deceptive emails or messages that look legitimate (IT alerts, delivery notices, “professor requests”).
  • Pretexting: a made-up story (“I’m from tech support; I need your OTP to fix this”).
  • Baiting: tempting you with something free (free storage, gift cards, leaked study guide) in exchange for a click or download.
  • Vishing/Smishing: voice or text versions of phishing, often using spoofed caller IDs or urgent SMS links.

 

Why do people fall for it?

  • Urgency: “Act now or lose access” short-circuits careful thinking.
  • Authority & familiarity: Messages “from” a professor, boss, bank, or friend feel trustworthy.
  • Scarcity & reward: “Limited offer” or “grade release” creates excitement and pressure.
  • Social proof: “Everyone is doing this update” lowers your guard.

 

Red flags to watch for

  • Unexpected requests for passwords, OTPs, or personal data.
  • Slightly off email addresses, links, or domains (e.g., univ-support.co instead of univ.edu).
  • Poor spelling, off-tone language, or unusual urgency.
  • Attachments you didn’t expect: QR codes or links that bypass normal portals.

 

How to lower your human risk (practical steps)

  • Pause before you act. Urgency is a tactic; take 30 seconds to think.
  • Verify the source. Contact the sender using a known number, website, or in-person — don’t reply to the suspicious message.
  • Check the link before you click. Hover to preview the URL; when in doubt, navigate manually via bookmarks.
  • Protect your accounts. Use strong, unique passwords and Multi-Factor Authentication (MFA) everywhere it’s offered.
  • Lock down your info. Share the least possible personal data on social media; it fuels convincing scams.
  • Report quickly. Forward phishing to your IT/security team or the campus help desk; early reports protect others.

 

If you think you got hooked

  • Change your password(s) immediately — start with email, then anything reused.
  • Revoke malicious sessions and check account activity/security logs.
  • Notify IT/security so they can help contain any damage.
  • Learn and share what happened — your experience can prevent someone else’s.

 

The bottom line

Cybersecurity is a team sport. Tools help, but people make the difference. Stay calm, verify first, and report suspicious activity — you’ll protect yourself and our whole community.

 

For more information, please access the resources:

 

Details

Details

Article ID: 11629
Created
Wed 10/15/25 3:27 PM
Modified
Fri 10/17/25 11:49 AM