Social engineering. We can remember a time when typing that into a search engine lead to almost no return. Maybe some “free burger” videos or the like, but nothing about security. Jump forward to the present day and social engineering is more than just “free burgers”, it is a vector used in over 66% of all attacks by hackers, hacktivists and nation states.

For the last five years, Social-Engineer.Org has provided free education in the form of podcasts, newsletters, blogs and reports. The five books that Chris has written has lead to our company being engaged by organizations from all industries in the US with the goal of uncovering, patching and mitigating social engineering vectors.

The Social Engineering Infographic

We have compiled statistics from our many engagements over the years, such as:

  • 90% of the people we ask will provide not just the spelling of their names but their email addresses without confirming our identity
  • 67% of the people we ask will give out social security numbers, birth dates or employee numbers
  • We have a 100% success ratio in physical breaches

 

How do these numbers compare to the market around the globe? That is why Social-Engineer decided to fund the creation of an intensive and extensive infographic. Research has been compiled from all of the latest reports and statistics available and put into a graphical format to help educate people on these threats.

As always, our motto is “Security Through Education” and we wanted to make the infographic about that, so it is complete with three principles to help you, your families, and your companies stay protected from social engineering threats.

We hope you enjoy it and find it extremely useful. Please take a quick look, and if you like it, pass it on to someone you know. Human-based attacks in the form of phishing, vishing, and impersonation are on the rise. If you follow our Twitter (@SocEngineerInc, @humanhacker), you’ll see the stories. Remember, technology won’t keep you safe.

We hope you enjoy the info graphic below. It is also in our resources page.