Estimated read time: 4 minutes
Welcome to the evolution of social engineering—where cybercriminals don’t hack machines, they hack people. The evolution of social engineering is rapid. Hackers are constantly coming up with new social engineering scams you can’t afford to ignore. Time to wise up!
In a world where smartphones double as offices and emails replace boardrooms, the real threat to your business might not be malware—but manipulation.
Social engineering scams were likely used to kick off the recent attacks on large retailers in the UK, but they’re not just reserved for high value targets.

What Is Social Engineering?
It’s the art of psychological manipulation—tricking individuals into divulging confidential information or performing actions that compromise security.
Phishing emails, bogus invoices, fake voice messages from “the boss”—these attacks are becoming more realistic by the day. And no, it’s not just your IT department’s or IT support provider’s problem anymore. If you use a smartphone, email, or social media, you’re a target. So here we go, onto the social engineering scams you can’t afford to ignore…
Attack #1: Business Email Compromise (BEC)
The scam
A finance team member receives a seemingly urgent email from a known vendor asking to update their banking details. The email is realistic, the tone familiar—and the scam works.
Why it’s dangerous:
Cybercriminals spoof or hijack trusted email accounts to request fraudulent payments. A few swapped characters in an email address can go unnoticed until it’s too late. People in a rush aren’t likely to spot subtle differences.
What to Do:
Stop-Think-Verify – Always confirm sensitive financial requests via an alternate method, like a phone call to a known number. Don’t rely solely on email, no matter how authentic it seems.
Attack #2: Authentication Fraud
The scam:
An email urges a password reset. It looks like it’s from your IT team. But it’s a trap.
The bigger risk:
Cybercriminals gather your personal info from social media to reset passwords or impersonate you, so they can use your account to dupe your colleagues (who may have greater permissions than you).
What to Do:
- Enable Multi-Factor Authentication (MFA) across all systems.
- Educate staff to stop, look, and think before clicking.
- Avoid oversharing personal information on public profiles.
- Lock down your security & privacy settings
Remember – MFA is more than a strong password—it adds a second layer like a one-time code, app notification, or fingerprint, making access far harder for attackers. If your MFA prompts you to approve a login to a system, but you haven’t tried logging in yourself whatever you do, don’t approve the login, because that will let the hacker in. It’s amazing how often people click ‘approve’ on autopilot, so you need to be on your guard! Instead, now you know a hacker has got hold of your password, change it immediately on every system where you’ve used that same password!
If you’ve read some of our earlier blog posts hopefully you won’t still be using the same password for more than one system. But if you still are, go back, read those articles and take action! You’ll find the most recent one here
Attack #3: AI-Powered Voice & Video Scams
The scam:
You get a voice message from your CEO or Finance Director, asking for urgent payment details. Only… it’s not her.
The tech:
Thanks to generative AI, scammers can clone voices and faces with chilling accuracy. Welcome to the age of deepfakes and AI voice spoofing.
The red flags:
- Unusual speech patterns or tone
- Generic or scripted language
- Urgency and emotional manipulation
What to Do:
Don’t trust—verify. Call back on a known number, use internal channels, or check in person if possible.
Spotting Deepfakes
A deepfake might be convincing—but look closer:
- Unnatural blinking or facial movements
- Inconsistent lighting or shadows
- Emotionless voice or mismatched tone
- Glitchy reflections in glasses or teeth that seem “off”
It takes practice, but knowing what to look for is half the battle.
Key Takeaways for SME Leaders – in the fight against the evolution of Social Engineering
- Trust your gut—if something feels off, it probably is.
- Verify before acting—especially with financial or sensitive data.
- Invest in MFA and employee training—it’s your best line of defence
- Raise awareness—scams can hit anyone, not just senior staff.
- Have a policy—and make sure your team knows how to report suspicious activity.
The Bottom Line
Technology like AI offers incredible benefits to small and medium businesses—but it also gives cybercriminals new tools. Staying informed is no longer optional. It’s essential.
We’re blogging so much about cyber security nowadays only to ensure you have the knowledge you need to stay safe.
Pause. Question. Confirm.
That’s how you outsmart social engineers.
You know when your gut tells you something isn’t right, so listen to it, so you don’t need our help with that. We can definitely help you with points 2-5 above though!
Give us a call now and let’s get the ball rolling, so you can get your team primed and ready to spot and report suspicious activity.
The National Cyber Security Centre also has more information on the various types of phishing & social engineering scams as they evolve. There’s lots of useful info on how to protect yourself and your business. Take a look here and we recommend you return on a regular basis to see what’s changing.