The BulrushesThe Bulrushes
  • Home
  • News
    • General
    • Politics
    • World
  • APO Releases
  • Business
  • Sport
    • Athletics
    • Basketball
    • Boxing
    • Cricket
    • Football
    • Rugby
    • Netball
    • Swimming
    • Tennis
  • Entertainment
  • Bookmarks
Search
  • Crime
  • Health
  • Lifestyle
  • Science
  • Weird World
  • Company Profile
  • Contact Us
  • Privacy Policy
Copyright © 2026 The Bulrushes
Reading: Why Social Engineering Is Still The Top Cybersecurity Threat – And What To Do About It, Writes Anna Collard 
Share
Notification Show More
Font ResizerAa
The BulrushesThe Bulrushes
Font ResizerAa
Search
  • Home
  • SA National Elections 2024
  • News
    • General
    • Politics
    • World
  • Sport
    • Athletics
    • Basketball
    • Boxing
    • Cricket
    • Football
    • Netball
    • Rugby
    • Swimming
    • Tennis
  • Bookmarks
    • Customize Interests
    • My Bookmarks
  • The Bulrushes
    • Company Profile
    • Contact Us
    • Privacy Policy
Follow US
Copyright © 2026 The Bulrushes
The Bulrushes > Columns > Why Social Engineering Is Still The Top Cybersecurity Threat – And What To Do About It, Writes Anna Collard 
Columns

Why Social Engineering Is Still The Top Cybersecurity Threat – And What To Do About It, Writes Anna Collard 

Almost 70% of data breaches involve the human element; Here’s how organisations can keep their most vital assets – their employees, their finances and their data – safe from scammers

Anna Collard
Anna Collard
Published: October 21, 2024
Share
5 Min Read
SHARE

Social engineering remains the most pervasive form of cyberattack for one reason – humans are easier to hack into than most machines.

Exploiting our psychological, personality or behavioural weaknesses, cybercriminals can dupe us to get unauthorised access to systems or gain financial rewards by deceiving their victims.

Social-engineering attacks can be carried out through various channels, including emails (phishing), phone calls, SMSs, social media, chat apps, gaming platforms, and video conferencing.

The main reason social engineering is so effective is that it keeps evolving.

There isn’t a clear or consistent pattern, meaning that, like the attacks themselves, we need to keep adapting in our response to them.

We can’t rely on technology alone to help us because of the human element involved in social engineering.

Moreover, the rapid advance of artificial intelligence has significantly altered the digital landscape.

The rise of deepfakes, convincingly real images, and videos artificially generated, has further exacerbated the potential for misinformation and manipulation.

Tools of the trade

Scammers excel at exploiting human emotions and cognitive biases to achieve their goals.

They often use impersonation, where they gain your trust by pretending to be someone familiar or instilling fear, prompting you to act impulsively.

This tactic is particularly effective, as it can lead you to make quick decisions, like clicking on a link or sharing sensitive information.

Another common strategy is creating a sense of urgency or using the principle of scarcity to pressure you into taking immediate action.

Finally, they may also leverage the concept of authority, posing as a figure of authority to manipulate you into compliance.

If you analyse the data, certain personality types and demographics are more prone to social-engineering threats than others.

For instance, those who are easily distracted and impulsive may be easier to fool than others.

Those who are sleep-deprived, stressed, and constantly multitasking may also fall prey to scams quicker than those who are calmer, attentive, and attuned to their own inner state.

These tactics have huge implications for businesses.

The most obvious consequence of social engineering attacks is financial loss to your organisation, data breaches in which sensitive information is stolen, privacy violations, and potential business disruptions.

The effect of a major security breach can be devastating to a company’s reputation, eroding customer trust and possibly leading to legal liabilities.

Defending your organisation

Given that the stakes are so high, what can organisations do to protect themselves from social engineering attacks?

Firstly, there are technological solutions to consider, such as email filters, which can detect and block phishing attempts before they reach employees.

Phishing-resistant Multi-Factor Authentication is also a good idea as it adds a layer of security, making it harder for attackers to gain unauthorised access.

Companies can also implement user-behaviour analytics to monitor and analyse employees’ activities to detect anomalies that could indicate a compromised account.

But technology alone is not enough.

Companies need to invest in the right cybersecurity training, cultivating a human-centric security culture and mindful security practices.

In my research, I’ve demonstrated that the validated benefits of mindfulness can positively impact 23 out of 33 identified factors that make humans vulnerable to social engineering, including cognitive, psychological, behavioural, and situational factors.

A mindful approach promotes a deeper level of awareness, encouraging employees to avoid multi-tasking and pause to notice their internal and external environment before reacting.

It also develops key mental attributes, such as concentration, resilience, self-regulation and clarity.

For this to happen, a transformative shift in organisational culture is needed, fostering intentional slowing down, with executive support promoting employee wellbeing over immediacy.

Integrating mindfulness concepts into training programmes, such as emotional phishing awareness training for frequent clickers and advocating a zero-trust mindset, can help enhance cybersecurity campaigns and awareness efforts.

To find out more on how to implement this approach, read the full research paper here (http://apo-opa.co/4f9ysC9).

*The author of this article is Anna Collard, an SVP Content Strategy & Evangelist at KnowBe4 AFRICA. The views expressed by Anna Collard are not necessarily those of The Bulrushes

Support The Bulrushes PayPal Logo
Share This Article
Facebook Whatsapp Whatsapp LinkedIn Email Copy Link
Share
What do you think?
Love0
Sad0
Surprise0
Angry0
Happy0
Previous Article Tax Justice SA Survey: Non-Compliant Electrical Plugs, Cables, Fittings Put Consumers At Risk
Next Article TNA Breakfast Briefings: SIU To Probe SABC Payments To Gupta Brothers

Stay Connected

FacebookLike
XFollow

Latest News

@Sandton Spa And Eminence Organic Skin Care Host A Ladies’ High Tea
Sponsored
April 8, 2026
South Africa Judiciary Mourns Passing Of Judge Taswell Papier
News
April 8, 2026
ActionSA Reports Minister Tolashe To The Police For Alleged Corruption
News
April 8, 2026
Gauteng Education MEC Maile Condemns ‘Torching’ Of Riverlea Secondary School
News
April 8, 2026
//

The Bulrushes prides itself on real news you can trust. We keep everything simple – no fudging.

  • Company Profile
  • Contact Us
  • Privacy Policy
  • News
  • Politics
  • General
  • World
  • Athletics
  • Basketball
  • Boxing
  • Cricket
  • Football
  • Netball
  • Rugby
  • Swimming
  • Tennis
The BulrushesThe Bulrushes
Follow US
Copyright © 2026 The Bulrushes