Do you know how prevalent Social Engineering actually is?
While only 3% of cyberattacks involve malware, 97% use Social Engineering.
79% of Social Engineering attacks are successful.
83% of all companies experienced phishing attacks last year.
What are the threats?
Cybercrimes today are more technologically advanced and less likely to be detected. Help educate your clients about potential cyberattacks. Find out about the many different types of Social Engineering attacks that could impact your clients’ businesses. Select a term to learn more.
Tailgating
Business Email Attacks (BEA)
Phishing
Fraud
Malware
Spoofing
Pretexting
Vishing
Baiting / Quid Pro Quo
Ransomware
Smishing
TAILGATING
When someone who is not authorized, accesses a restricted area by following an employee who is authorized and enters a restricted zone
BUSINESS EMAIL ATTACKS (BEA)
Carefully planned emails to trick recipients into transferring funds to a fraudulent account.
Phishing
Attemps to persuade users to open what turns out to be unsafe attachments or clicking on dangerous URLs
FRAUD
Fraudulent emails appear to originate from an executive asking a recipient to wire money or disclose sensitive information.
MALWARE
Disruptive or damaging software specifically designed to achieve unauthorized access to a computer system.
SPOOFING
Tricking employees and customers into thinking a web address is real by making it look like it came from a trusted brand.
PRETEXTING
When an individual lies to receive privileged data.
BAITING / QUID PRO GUO
Asks for information with a promise in exchange for that information, typically a form of service.
RANSOMWARE
Malicious software, or malware, designed to deny access to a computer system or data until a ransom is paid.
SMISHING
Security attacks that trick users into downloading a Trojan horse, virus or other malware onto a cellular phone or other mobile device.
VISHING
When someone tries to trick you into giving them your private information via a text, SMS or voice message.
Tailgating
When someone who is not authorized, accesses a restricted area by following an employee who is authorized and enters a restricted zone.
You would think tech-savvy millennials know all about Social Engineering threats. In fact, they don’t.
Studies show Baby Boomers and Gen-Xers are much more knowledgeable about Social Engineering. In fact, they outperform all others in fundamental understanding of phishing and ransomware.
ANSWERED INCORRECTLY
DID NOT KNOW
ANSWERED CORRECTLY




Source: State of the Phish Report
What industries are most vulnerable to cyberattacks?
AVERAGE NUMBER OF EMAIL FRAUD ATTACKS
Engineering is 90%
more likely to be
attacked than
other industries
more likely to be
attacked than
other industries
Source: The Human Factor Report, 2019
Less than what percent of cyberattacks use system vulnerabilities?


The rest exploit human interaction.
Source: The Human Factor Report, 2019
"Training employees about Social Engineering creates a human firewall — making companies less vulnerable."
Lisa Block
Vice President, AXIS - National Commercial Crime Product Manager
Learn more about our Social Engineering Insurance Solutions
Risks associated with Social Engineering require thinking in new and dynamic ways, which is exactly what we deliver for you and your clients.
Contact Us