{"id":2022,"date":"2021-02-23T20:04:18","date_gmt":"2021-02-24T01:04:18","guid":{"rendered":"https:\/\/truxgoservers.com\/blog\/?p=2022"},"modified":"2021-02-23T20:04:19","modified_gmt":"2021-02-24T01:04:19","slug":"social-engineering-what-we-should-know-about-this","status":"publish","type":"post","link":"https:\/\/truxgoservers.com\/blog\/social-engineering-what-we-should-know-about-this\/","title":{"rendered":"Social Engineering &#8211; What we should know about this"},"content":{"rendered":"\n<p>Social engineering is tricking people into giving up personal information such as passwords or bank details or allowing access to a computer in order to inadvertently install malicious software. Thieves and scammers use social engineering because it is easier to trick someone into revealing your password than it is to breach your security.<\/p>\n\n\n\n<p>The term social engineering has its origin in the social sciences, where it refers to any effort of the factors of change with the purpose of influencing or shaping the behavior of the target population. In simpler terms, social engineering involves the use of manipulation in order to achieve an end, be it good or bad.<\/p>\n\n\n\n<p>To carry out successful social engineering attacks, many hackers rely solely on the will to help their potential victims. Similarly, they may try to take advantage of their victims&#8217; lack of technology knowledge. In most cases, hackers will conduct an investigation on the potential target. For individual purposes, this involves a thorough review of their social media accounts, looking for any information they can use to sell.<\/p>\n\n\n\n<p>Another method would be business. Which hackers need someone undercover to collect data about the company they want to attack, its operations, the hierarchy of employees and the list of business partners. Most target low-level employees who have access to this information. Either you will trick your target into sharing this information voluntarily.<\/p>\n\n\n\n<p>The best way to deal with the problem is to make people aware of it. Educating them about safety and encouraging the adoption of preventive measures and what you should teach both you and your employees would be:<\/p>\n\n\n\n<p><strong><em>\u25b8If you suspect that someone is trying to perform a deception, you must demand that you identify yourself and try to reverse the situation by trying to obtain as much information from the suspect as possible.<\/em><\/strong><\/p>\n\n\n\n<p><strong><em>\u25b8Never share sensitive information with strangers or in public places such as social media, advertisements, etc.<\/em><\/strong><\/p>\n\n\n\n<p><strong><em>\u25b8Implement a set of security policies in the organization that minimize risk actions.<\/em><\/strong><\/p>\n\n\n\n<p><strong><em>\u25b8Carry out physical security controls to reduce the inherent danger to people.<\/em><\/strong><\/p>\n\n\n\n<p>Check also:<br><a href=\"https:\/\/truxgoservers.com\/blog\/man-in-the-middle-be-careful-with-these-attacks\/\">Man In The Middle \u2013 Be careful with these attacks<\/a><br><a href=\"https:\/\/truxgoservers.com\/blog\/phishing-simplest-but-dangerous-way-of-a-cyberattack\/\">Phishing \u2013 simplest but dangerous way of Cyberattack<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Social engineering is tricking people into giving up personal information such as passwords or bank details or allowing access to a computer in order to inadvertently install malicious software. Thieves and scammers use social engineering because it is easier to trick someone into revealing your password than it is to breach your security. The term [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2023,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[36],"class_list":["post-2022","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Social Engineering - What we should know about this - Truxgo Server Blog<\/title>\n<meta name=\"description\" content=\"Social engineering within the scope of Cybersecurity can pose a very great personal and business risk, which is why we will analyze....\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/truxgoservers.com\/blog\/social-engineering-what-we-should-know-about-this\/\" \/>\n<meta property=\"og:locale\" content=\"es_MX\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Social Engineering - What we should know about this - Truxgo Server Blog\" \/>\n<meta property=\"og:description\" content=\"Social engineering within the scope of Cybersecurity can pose a very great personal and business risk, which is why we will analyze....\" \/>\n<meta property=\"og:url\" content=\"https:\/\/truxgoservers.com\/blog\/social-engineering-what-we-should-know-about-this\/\" \/>\n<meta property=\"og:site_name\" content=\"Truxgo Server Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-24T01:04:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-02-24T01:04:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/02\/Social.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Truxgo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Truxgo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/social-engineering-what-we-should-know-about-this\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/social-engineering-what-we-should-know-about-this\\\/\"},\"author\":{\"name\":\"Truxgo\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/person\\\/8b409c26449db6aa09724b45331e333e\"},\"headline\":\"Social Engineering &#8211; What we should know about this\",\"datePublished\":\"2021-02-24T01:04:18+00:00\",\"dateModified\":\"2021-02-24T01:04:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/social-engineering-what-we-should-know-about-this\\\/\"},\"wordCount\":371,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/social-engineering-what-we-should-know-about-this\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Social.jpg\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/social-engineering-what-we-should-know-about-this\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/social-engineering-what-we-should-know-about-this\\\/\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/social-engineering-what-we-should-know-about-this\\\/\",\"name\":\"Social Engineering - What we should know about this - Truxgo Server Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/social-engineering-what-we-should-know-about-this\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/social-engineering-what-we-should-know-about-this\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Social.jpg\",\"datePublished\":\"2021-02-24T01:04:18+00:00\",\"dateModified\":\"2021-02-24T01:04:19+00:00\",\"description\":\"Social engineering within the scope of Cybersecurity can pose a very great personal and business risk, which is why we will analyze....\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/social-engineering-what-we-should-know-about-this\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/social-engineering-what-we-should-know-about-this\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/social-engineering-what-we-should-know-about-this\\\/#primaryimage\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Social.jpg\",\"contentUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Social.jpg\",\"width\":1280,\"height\":720},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/social-engineering-what-we-should-know-about-this\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Social Engineering &#8211; What we should know about this\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/\",\"name\":\"Truxgo Server Blog\",\"description\":\"Cloud Server and Hosting Tutorials.\",\"publisher\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#organization\",\"name\":\"Truxgo Server Blog\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/cropped-truxgo-logo-blanco.png\",\"contentUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/cropped-truxgo-logo-blanco.png\",\"width\":1250,\"height\":278,\"caption\":\"Truxgo Server Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/person\\\/8b409c26449db6aa09724b45331e333e\",\"name\":\"Truxgo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g\",\"caption\":\"Truxgo\"},\"sameAs\":[\"https:\\\/\\\/truxgoservers.com\\\/blog\"],\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/author\\\/truxgo\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Social Engineering - What we should know about this - Truxgo Server Blog","description":"Social engineering within the scope of Cybersecurity can pose a very great personal and business risk, which is why we will analyze....","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/truxgoservers.com\/blog\/social-engineering-what-we-should-know-about-this\/","og_locale":"es_MX","og_type":"article","og_title":"Social Engineering - What we should know about this - Truxgo Server Blog","og_description":"Social engineering within the scope of Cybersecurity can pose a very great personal and business risk, which is why we will analyze....","og_url":"https:\/\/truxgoservers.com\/blog\/social-engineering-what-we-should-know-about-this\/","og_site_name":"Truxgo Server Blog","article_published_time":"2021-02-24T01:04:18+00:00","article_modified_time":"2021-02-24T01:04:19+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/02\/Social.jpg","type":"image\/jpeg"}],"author":"Truxgo","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Truxgo","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/truxgoservers.com\/blog\/social-engineering-what-we-should-know-about-this\/#article","isPartOf":{"@id":"https:\/\/truxgoservers.com\/blog\/social-engineering-what-we-should-know-about-this\/"},"author":{"name":"Truxgo","@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/person\/8b409c26449db6aa09724b45331e333e"},"headline":"Social Engineering &#8211; What we should know about this","datePublished":"2021-02-24T01:04:18+00:00","dateModified":"2021-02-24T01:04:19+00:00","mainEntityOfPage":{"@id":"https:\/\/truxgoservers.com\/blog\/social-engineering-what-we-should-know-about-this\/"},"wordCount":371,"commentCount":0,"publisher":{"@id":"https:\/\/truxgoservers.com\/blog\/#organization"},"image":{"@id":"https:\/\/truxgoservers.com\/blog\/social-engineering-what-we-should-know-about-this\/#primaryimage"},"thumbnailUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/02\/Social.jpg","keywords":["Cybersecurity"],"articleSection":["Cybersecurity"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/truxgoservers.com\/blog\/social-engineering-what-we-should-know-about-this\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/truxgoservers.com\/blog\/social-engineering-what-we-should-know-about-this\/","url":"https:\/\/truxgoservers.com\/blog\/social-engineering-what-we-should-know-about-this\/","name":"Social Engineering - What we should know about this - Truxgo Server Blog","isPartOf":{"@id":"https:\/\/truxgoservers.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/truxgoservers.com\/blog\/social-engineering-what-we-should-know-about-this\/#primaryimage"},"image":{"@id":"https:\/\/truxgoservers.com\/blog\/social-engineering-what-we-should-know-about-this\/#primaryimage"},"thumbnailUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/02\/Social.jpg","datePublished":"2021-02-24T01:04:18+00:00","dateModified":"2021-02-24T01:04:19+00:00","description":"Social engineering within the scope of Cybersecurity can pose a very great personal and business risk, which is why we will analyze....","breadcrumb":{"@id":"https:\/\/truxgoservers.com\/blog\/social-engineering-what-we-should-know-about-this\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/truxgoservers.com\/blog\/social-engineering-what-we-should-know-about-this\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/truxgoservers.com\/blog\/social-engineering-what-we-should-know-about-this\/#primaryimage","url":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/02\/Social.jpg","contentUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/02\/Social.jpg","width":1280,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/truxgoservers.com\/blog\/social-engineering-what-we-should-know-about-this\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/truxgoservers.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Social Engineering &#8211; What we should know about this"}]},{"@type":"WebSite","@id":"https:\/\/truxgoservers.com\/blog\/#website","url":"https:\/\/truxgoservers.com\/blog\/","name":"Truxgo Server Blog","description":"Cloud Server and Hosting Tutorials.","publisher":{"@id":"https:\/\/truxgoservers.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/truxgoservers.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/truxgoservers.com\/blog\/#organization","name":"Truxgo Server Blog","url":"https:\/\/truxgoservers.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/08\/cropped-truxgo-logo-blanco.png","contentUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/08\/cropped-truxgo-logo-blanco.png","width":1250,"height":278,"caption":"Truxgo Server Blog"},"image":{"@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/person\/8b409c26449db6aa09724b45331e333e","name":"Truxgo","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g","caption":"Truxgo"},"sameAs":["https:\/\/truxgoservers.com\/blog"],"url":"https:\/\/truxgoservers.com\/blog\/author\/truxgo\/"}]}},"_links":{"self":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts\/2022","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/comments?post=2022"}],"version-history":[{"count":3,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts\/2022\/revisions"}],"predecessor-version":[{"id":2033,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts\/2022\/revisions\/2033"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/media\/2023"}],"wp:attachment":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/media?parent=2022"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/categories?post=2022"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/tags?post=2022"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}