Skip to main content

How to protect your SME from social engineering

Small to medium enterprises (SMEs) need to be aware of cybersecurity risks, including social engineering attacks. Knowing the warning signs to look out for could help protect your business from social engineering, as can the right insurance cover.

What is social engineering?

Sometimes called ‘human hacking’, social engineering refers to manipulating people into divulging sensitive information, granting access to private data, or transferring money.

While hackers in the movies use high-tech tools to break into secure networks, in real life it’s often much simpler to trick someone into handing over a password or account details.

Like other cyber risks, social engineering can not only affect your SME’s bottom line, but your customers’ security and your company’s reputation. 

Why are SMEs vulnerable to social engineering attacks?

Smaller new businesses and startups are vulnerable to social engineering attacks, for reasons including:

  • Limited knowledge: Without cybersecurity awareness training, recognising social engineering can be harder.
  • Too quick to trust: Smaller staff numbers and a tight-knit family-style culture can make some SMEs too quick to accept fraudulent requests from malicious actors impersonating employees or clients.
  • Less cybersecurity technology: Secure IT infrastructure can help protect against social engineering attacks, but not all SMEs can set up and maintain these systems. 
  • Employee errors: Your workers may be personally compromised by social engineering without realising it, making your business vulnerable. 

How often are small businesses targeted by social engineering attacks? 

While many hackers target individuals, businesses have been more frequently targeted by cyber threats in recent years. 

New Zealand’s Computer Emergency Response Team (CERT NZ) found that in Q2 2023, 144 reported incidents (7% of the total) specifically affected organisations, compared with 111 (6%) in Q1 2023. Of these 144 reported incidents, the finance and insurance sector accounted for 30%, the most of any business sector.

Phishing and credential harvesting was the largest category of incidents reported to CERT NZ in Q2 2023, accounting for 72 (50%) incidents. The media and telecommunications sector reported that over 50% of their incidents related to phishing and credential harvesting.

Software developers have also reported a 742% average annual increase in software supply chain attacks over the past 3 years.

What are common types of social engineering?

Hackers use a wide variety of social engineering tactics, such as: 

  • Phishing: Sending fake emails to trick recipients into opening compromised links or attachments. Variants include smishing, which uses SMS messages and vishing, which uses voice telephone calls. Spear-phishing targets a specific individual, such as a manager or C-suite executive. 
  • Business email compromise: Sending emails that impersonate managers, colleagues, customers or clients, requesting you make a payment to a scammer’s bank account.
  • Baiting: Leaving malware-infected devices such as USB sticks in public places, hoping someone will plug them into a work computer.
  • Pretexting: Creating a false identity and setting up a deceptive scenario to trick employees into granting access to sensitive data.
  • Tailgating: Physically accessing a secured area such as an office by slipping through a door or gate behind an unsuspecting employee, or posing as someone who ‘forgot their passcard’. 

What are ways to recognise social engineering? 

Knowing these basic signs of potential social engineering can help to decrease the risk of a successful attack: 

  • Unexpected messages: Emails or calls from unknown parties or at odd times can indicate social engineering. 
  • Unusual requests: Messages from people you know that seem out of character, or requests for you to do something outside of your usual role, may not be legitimate. 
  • Unusual files or URLs: Unfamiliar file formats or mismatched domain names could be risky to access.
  • Urgency and secrecy: Requests to act quickly and without question, or to conceal your actions from your colleagues or managers, may not be trustworthy.
  • Offers too good to be true: Being offered something for nothing may be a sign that you’re being targeted.
  • Incorrect details: Little inconsistencies, like spelling mistakes, incorrect job titles, or outdated or low-resolution logos or images could all be warning signs. 

How can an organisation defend itself from social engineering attacks?

Some of the steps that SMEs can take to help minimise social engineering risks include:

  • Education and training: Keep all staff aware of social engineering and other cyber threats, and how to respond accordingly. 
  • Policies and procedures: Set firm rules for handling customer data, sensitive information, and requests for access.
  • Multi factor authentication (MFA): Enabling MFA can make it much harder to access sensitive data, especially if multiple approvals are required for money transfers.
  • Regular security audits: Cyber security isn’t something you can easily ‘set and forget’, so schedule checks for vulnerabilities and updates for your systems.
  • Create a culture of security: Create an environment where checking even legitimate requests is routine, and no-one will feel ashamed or embarrassed to report a potential breach. 

What is social engineering insurance?

Social engineering is often covered as part of your business cybersecurity insurance. As well as the right cover, you may also want expert guidance and support to address social engineering challenges. 

For example, Marsh’s dedicated cyber teams and advisory services can: 

  • Conduct risk assessments to identify vulnerabilities and develop strategies and countermeasures.
  • Prepare incident response plans to help mitigate the effects of social engineering and minimise downtime.
  • Provide technology solutions to help detect and prevent social engineering attempts. 

What to do next if you are targeted by a social engineering attack

  1. Check your incident response plan if you have one
  2. Disconnect affected devices from the internet
  3. Check financial accounts
  4. Change your passwords
  5. Collect as much evidence as possible
  6. Contact your bank
  7. Contact your insurer
  8. Report the incident to the police and any other relevant authorities

Alternatively, Marsh customers can call the incident response hotline, and a dedicated claims team will take over, offering personalised advice on the best steps to take next.

Call us on 0800 376 304 to talk to one of our specialists, or complete our cyber insurance enquiry form today.

Need help?

If you have any questions about the content covered in this article or the risks and insurance coverage requirements for your business, reach out to your Marsh risk advisor today or contact us.

LCPA 24/316

Marsh Ltd (NZBN 9429040918792)(“Marsh”) arranges insurance and is not an insurer. This publication is not intended to be taken as advice regarding any individual situation and should not be relied upon as such. The information contained herein is based on sources we believe reliable, but we make no representation or warranty as to its accuracy. Marsh shall have no obligation to update this publication and shall have no liability to you or any other party arising out of this publication or any matter contained herein. Any modelling, analytics, or projections are subject to inherent uncertainty, and any analysis could be materially affected if any underlying assumptions, conditions, information, or factors are inaccurate or incomplete or should change.