{"id":36721,"date":"2021-07-16T09:48:47","date_gmt":"2021-07-16T01:48:47","guid":{"rendered":"https:\/\/version-2.com\/?p=36721"},"modified":"2021-09-03T16:35:52","modified_gmt":"2021-09-03T08:35:52","slug":"how-to-prevent-social-engineering-attacks","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2021\/07\/how-to-prevent-social-engineering-attacks\/","title":{"rendered":"How to Prevent Social Engineering Attacks"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"36721\" class=\"elementor elementor-36721\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a9966c4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a9966c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;437ef7f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2884b38\" data-id=\"2884b38\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-980bf1e post-content elementor-widget elementor-widget-text-editor\" data-id=\"980bf1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p align=\"center\"><img decoding=\"async\" src=\"https:\/\/senhasegura.com\/wp-content\/uploads\/2021\/06\/How-to-Prevent-Social-Engineering-Attacks-01.png\" alt=\"\" width=\"958\" height=\"auto\" \/><\/p>\nWhen it comes to\u00a0<a href=\"https:\/\/senhasegura.com\/how-to-prevent-social-engineering-attacks\/blank\">cybersecurity<\/a>, many think about protecting themselves against hackers who use technological flaws in a system to steal data.\n\nBut cyberattacks can\u2019t just be malware intrusions, there are other ways to infiltrate organizations and networks with the victim\u2019s consent and without the victim\u2019s knowledge of what is going on.\n\nThis type of deception is known as social engineering, which in essence is manipulating someone until sensitive data and access permissions are granted.\n<p>A well-known example of this is when an intruder poses as the IT support of a particular company, asking users to provide information such as their usernames and passwords. The scam is accomplished when this information is shared.<\/p>\n<p>It is surprising how many people do not think twice about sharing this information, especially if it looks like it is being requested by a legitimate representative.<\/p>\n<p>In this context, we bring you some information relevant to the precaution against these attacks! Keep reading and learn how to protect yourself from social engineering attacks.<\/p>\n\n\n<h2><strong>What Would Social Engineering Be?<\/strong><\/h2>\n<p>\nThe definition of social engineering embraces many types of psychological manipulations. This concept can generate positive results when it is taken to the area of behavioral promotion.<\/p>\n<p><a href=\"https:\/\/senhasegura.com\/how-to-prevent-social-engineering-attacks\/blank\">Information Security<\/a>, however, tends to treat social engineering as an evil that provides benefits to the criminals, involving\u00a0<b>manipulation to obtain private information<\/b>, such as personal and financial data. Thus, social engineering can also be defined as a cybercrime.<\/p>\n\n\n<h2><strong>How Does Social Engineering Work?<\/strong><\/h2>\n\n<p>Unfortunately, for humans, there are still some relationship patterns that are established. Social engineering works by taking advantage of these\u00a0<b>cognitive prejudice<\/b>\u00a0situations where criminals steal financial and personal information.<\/p>\n<p>A strong example of this can be seen in the human tendency of trusting people who look nicer and more friendly, or even who hold a position of higher authority.<\/p>\n<p><b>Social engineering techniques\u00a0<\/b>exploit this natural human confidence. In 2018, vacation rental phishing scams, in which hackers impersonated owners offering real vacation listings, were common enough that the US Federal Trade Commission issued a warning about them.<\/p>\n<p>In many cases, the contact information and emails of the real owners were hacked, leaving little reason for victims to think they were not discussing a rental with the real owner.<\/p>\n\n\n<h2><strong>Who is Most Vulnerable to Social Engineering?<\/strong><\/h2>\n<p>\nAnyone can fall victim to a\u00a0<a href=\"https:\/\/senhasegura.com\/how-to-prevent-social-engineering-attacks\/blank\">social engineering<\/a>\u00a0attack. Each one has their cognitive prejudices that, most of the time, go unnoticed during social life.<\/p>\n<p>However, there are some particular groups that, in a way, are \u201ceasy\u201d targets for these criminals, such as the elderly, who may not have knowledge of technology, generally have fewer human interactions, and may be perceived as having a lot of money and goods to discard.<\/p>\n\n<h2>\n<strong>What Are Common Social Engineering Techniques?<\/strong><\/h2>\n<p>\n<b>Social engineering techniques can take many forms<\/b>. Below we list the commonly used techniques.\n<\/p>\n\n<h3><strong>Trust Exploitation<\/strong><\/h3>\n<p>Users are less suspicious of people they are familiar with. An attacker can become familiar with system users before the social engineering attack.\u00a0The opportunist can participate in social events and other environments, which makes the attacker familiar to users.<\/p>\n\n<h3><strong>Intimidating Circumstances\u00a0<\/strong><\/h3>\n<p>We tend to avoid people who intimidate others around us. Using this technique, an attacker could pretend to have a heated discussion on the phone or with an accomplice to the scam, and could then ask users for information that would be used to compromise the security of their system.<\/p>\n<p>Users are more likely to give the correct answers just to avoid a confrontation with the criminal. This technique can also be used to avoid being checked at a security checkpoint.<\/p>\n\n\n<h3><strong>Phishing<\/strong><\/h3>\n<p>This technique uses tricks and cheats to obtain users\u2019 private data. The social engineer might try to impersonate a genuine website, such as Google, and then ask the unsuspecting user to confirm their account name and password.<\/p>\n<p>This technique can also be used to obtain credit card information or any other valuable personal data.<\/p>\n\n<h3><strong>Exploring Human Curiosity<\/strong><\/h3>\n<p>Using this technique, the social engineer can deliberately leave a virus-infected USB stick in an area where users can easily pick it up. The user will likely connect the USB stick to the computer.<\/p>\n<p>Thus, the USB stick might run the virus automatically or the user might be tempted to open a file with a name, such as Employee Review Report 2013.docx, which might actually be an infected file.\n\n<\/p>\n\n<h3><strong>Exploring Human Greed<\/strong><\/h3>\n<p>Using this technique, the social engineer can entice the user with the promise of earning big money online by filling out a form and confirming their details using credit card details, etc.<\/p>\n\n\n<h2><strong>How to Protect Yourself from a Social Engineering Attack?<\/strong><\/h2>\n\n<p>Social engineering attacks are stealthy. This makes it critical for everyone to be aware of the threat. Some best practices you can follow to ensure you are protecting yourself from social engineering attacks include:<\/p>\n\n<ul>\n \t<li>Never responding to a request for financial information or passwords. Legitimate organizations will not send a message asking for personal information.<\/li>\n \t<li>Adjusting your spam filters. Every email program has spam filters, make sure yours is set to block potential threats.<\/li>\n \t<li>Protect your computing devices and accessories. That means protecting your digital space with antivirus software, firewalls, and email filters. It also means protecting USB sticks, external hard drives, and other pieces of equipment that could be compromised.<\/li>\n<\/ul>\n<p>Finally, managers must develop plans to raise awareness among the staff. There are many essential precautions available on the internet, and for corporate environments, the in-house team needs to be aware of how to protect against\u00a0<a href=\"https:\/\/senhasegura.com\/how-to-prevent-social-engineering-attacks\/blank\">digital threats<\/a>.<\/p>\n<p>Making sure employees are aligned for this purpose is an essential step in the process of preventing social engineering attacks and other cyberattacks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a7b53ad elementor-widget elementor-widget-shortcode\" data-id=\"a7b53ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18134\" class=\"elementor elementor-18134\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a909055 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"a909055\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4e3c0d4\" data-id=\"4e3c0d4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-10af45e elementor-widget elementor-widget-text-editor\" data-id=\"10af45e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Segura\u00ae <\/strong><br \/>Segura\u00ae strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>When it comes to\u00a0cybersecurity, many think about protec [&hellip;]<\/p>","protected":false},"author":143524195,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[419,461,61],"tags":[420,462],"class_list":["post-36721","post","type-post","status-publish","format-standard","hentry","category-segura","category-year2021","category-press-release","tag-segura","tag-462"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to Prevent Social Engineering Attacks - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/version-2.com\/en\/2021\/07\/how-to-prevent-social-engineering-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Prevent Social Engineering Attacks - Version 2\" \/>\n<meta property=\"og:description\" content=\"When it comes to\u00a0cybersecurity, many think about protec [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/version-2.com\/en\/2021\/07\/how-to-prevent-social-engineering-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-16T01:48:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-03T08:35:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/senhasegura.com\/wp-content\/uploads\/2021\/06\/How-to-Prevent-Social-Engineering-Attacks-01.png\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/07\\\/how-to-prevent-social-engineering-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/07\\\/how-to-prevent-social-engineering-attacks\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"How to Prevent Social Engineering Attacks\",\"datePublished\":\"2021-07-16T01:48:47+00:00\",\"dateModified\":\"2021-09-03T08:35:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/07\\\/how-to-prevent-social-engineering-attacks\\\/\"},\"wordCount\":949,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/07\\\/how-to-prevent-social-engineering-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/senhasegura.com\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/How-to-Prevent-Social-Engineering-Attacks-01.png\",\"keywords\":[\"Segura\",\"2021\"],\"articleSection\":[\"Segura\",\"2021\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/07\\\/how-to-prevent-social-engineering-attacks\\\/\",\"url\":\"https:\\\/\\\/version-2.com\\\/2021\\\/07\\\/how-to-prevent-social-engineering-attacks\\\/\",\"name\":\"How to Prevent Social Engineering Attacks - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/07\\\/how-to-prevent-social-engineering-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/07\\\/how-to-prevent-social-engineering-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/senhasegura.com\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/How-to-Prevent-Social-Engineering-Attacks-01.png\",\"datePublished\":\"2021-07-16T01:48:47+00:00\",\"dateModified\":\"2021-09-03T08:35:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/07\\\/how-to-prevent-social-engineering-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/version-2.com\\\/2021\\\/07\\\/how-to-prevent-social-engineering-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/07\\\/how-to-prevent-social-engineering-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/senhasegura.com\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/How-to-Prevent-Social-Engineering-Attacks-01.png\",\"contentUrl\":\"https:\\\/\\\/senhasegura.com\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/How-to-Prevent-Social-Engineering-Attacks-01.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/07\\\/how-to-prevent-social-engineering-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Prevent Social Engineering Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Prevent Social Engineering Attacks - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/version-2.com\/en\/2021\/07\/how-to-prevent-social-engineering-attacks\/","og_locale":"en_US","og_type":"article","og_title":"How to Prevent Social Engineering Attacks - Version 2","og_description":"When it comes to\u00a0cybersecurity, many think about protec [&hellip;]","og_url":"https:\/\/version-2.com\/en\/2021\/07\/how-to-prevent-social-engineering-attacks\/","og_site_name":"Version 2","article_published_time":"2021-07-16T01:48:47+00:00","article_modified_time":"2021-09-03T08:35:52+00:00","og_image":[{"url":"https:\/\/senhasegura.com\/wp-content\/uploads\/2021\/06\/How-to-Prevent-Social-Engineering-Attacks-01.png","type":"","width":"","height":""}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"version2hk","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/version-2.com\/2021\/07\/how-to-prevent-social-engineering-attacks\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2021\/07\/how-to-prevent-social-engineering-attacks\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"How to Prevent Social Engineering Attacks","datePublished":"2021-07-16T01:48:47+00:00","dateModified":"2021-09-03T08:35:52+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2021\/07\/how-to-prevent-social-engineering-attacks\/"},"wordCount":949,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/version-2.com\/2021\/07\/how-to-prevent-social-engineering-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/senhasegura.com\/wp-content\/uploads\/2021\/06\/How-to-Prevent-Social-Engineering-Attacks-01.png","keywords":["Segura","2021"],"articleSection":["Segura","2021","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2021\/07\/how-to-prevent-social-engineering-attacks\/","url":"https:\/\/version-2.com\/2021\/07\/how-to-prevent-social-engineering-attacks\/","name":"How to Prevent Social Engineering Attacks - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/version-2.com\/2021\/07\/how-to-prevent-social-engineering-attacks\/#primaryimage"},"image":{"@id":"https:\/\/version-2.com\/2021\/07\/how-to-prevent-social-engineering-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/senhasegura.com\/wp-content\/uploads\/2021\/06\/How-to-Prevent-Social-Engineering-Attacks-01.png","datePublished":"2021-07-16T01:48:47+00:00","dateModified":"2021-09-03T08:35:52+00:00","breadcrumb":{"@id":"https:\/\/version-2.com\/2021\/07\/how-to-prevent-social-engineering-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/version-2.com\/2021\/07\/how-to-prevent-social-engineering-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/2021\/07\/how-to-prevent-social-engineering-attacks\/#primaryimage","url":"https:\/\/senhasegura.com\/wp-content\/uploads\/2021\/06\/How-to-Prevent-Social-Engineering-Attacks-01.png","contentUrl":"https:\/\/senhasegura.com\/wp-content\/uploads\/2021\/06\/How-to-Prevent-Social-Engineering-Attacks-01.png"},{"@type":"BreadcrumbList","@id":"https:\/\/version-2.com\/2021\/07\/how-to-prevent-social-engineering-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/zh\/"},{"@type":"ListItem","position":2,"name":"How to Prevent Social Engineering Attacks"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/en\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-9yh","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/36721","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=36721"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/36721\/revisions"}],"predecessor-version":[{"id":36730,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/36721\/revisions\/36730"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=36721"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=36721"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=36721"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}