There are multiple components that make up a cyber attack. Understanding these, and how they interact within your organization is the first step for social engineering attack vector recognition that threaten operations and the critical data it contains.
Social engineering is the most prevalent access vector to gain access and enable an attack.
Social Engineering and Time-Tested Techniques
Social engineers use a variety of tools to manipulate their targets. Although the mediums of social engineering have expanded, the techniques employed are proven effective.
In general, people have a tendency to trust and develop a connection with others. Through social engineering, malicious actors are exploiting this vulnerability for a variety of end goals across the spectrum of targets.