Back to Intelligence
March 22, 2026Vinay KumarSocial Engineering Defence

How to Defend Against Social Engineering: A Practical Team Guide

Cover Image for How to Defend Against Social Engineering: A Practical Team Guide

How to Defend Against Social Engineering: A Practical Team Guide

We've spent the whole week on what social engineering is, how it works, and why it keeps succeeding. Every post this week — from the Coinbase insider breach to the MFA bypass playbook to the psychology of why smart people click — points at the same gap: people, under pressure, without the right protocols around them.

Today is the payoff. This is what you actually do about it.

And before anyone starts planning a six-figure security budget — the most effective controls here cost almost nothing. They just require decisions.


Why Most Defences Fail First

Most companies don't have zero social engineering defence. They have the wrong one.

Annual security training. A compliance checkbox. A once-a-year slideshow that everyone clicks through at 2x speed. Microsoft's own Digital Defense Report found that this kind of training yields only about a 3% reduction in phishing click rates unless reinforced by cultural and policy change. Three percent. Essentially noise.

The organisations that get this right don't have better technology. They have better habits — built through process, repetition, and a culture where reporting something suspicious is the obvious, comfortable thing to do.

Here's the framework. Five layers. Start anywhere, but start.


Layer 1: Verification Protocols — Your Highest-Impact Control

Write this policy. Put it in writing. Train every employee on it:

Any request involving an MFA reset, password change, financial transfer, or access to sensitive data requires verification through a second, pre-established channel — regardless of how urgent the request appears or who it claims to be from.

That means: if someone calls claiming to be the CFO needing an urgent wire transfer, you hang up and call the CFO back on the number in your company directory — not the one they gave you. If IT calls to reset your MFA, you raise a ticket through your internal system before it proceeds.

This one policy defeats the helpdesk attack that took down Uber, the vishing approach Muddled Libra used across 100+ enterprises, and a substantial portion of BEC fraud. It costs nothing. It requires only that you write it down and train people on it.

The key word is unconditional. The moment you allow urgency to be an exception, you've reopened the door.


Layer 2: Financial Authorisation — Out-of-Band Verification

Any payment request that arrives via email — regardless of who sent it — should require verbal confirmation through a separate channel before it's processed. Not a reply email. A phone call to a known number.

This is the control that would have stopped the $25.6 million Hong Kong deepfake transfer. A 30-second phone call to confirm a $25 million authorisation is not bureaucracy — it's the cheapest insurance your finance team can buy.

For amounts above a defined threshold, require two-person authorisation. Both people must independently verify the request.


Layer 3: Know Your Actual Risk — Run a Phishing Simulation

You cannot improve what you haven't measured. And almost every company that runs its first phishing simulation is surprised by the results.

KnowBe4's 2025 Phishing by Industry Benchmarking Report — analysing 67.7 million simulations across 62,400 organisations — found a global baseline click rate of 33.1%. One third of employees, before any training, will interact with a simulated phishing email.

For teams who want to test this themselves: GoPhish is a free, open-source phishing simulation framework. It runs on Windows, Mac, and Linux. You can set it up in an afternoon, build a realistic template, send it to your team, and get real data on who clicked, who submitted credentials, and who reported it. That data is more valuable than any number of training slides.

A note: GoPhish requires some technical setup — you'll need to configure a sending domain and SMTP. For teams without a technical person in-house, a managed simulation through a security firm is the more practical route.

Either way, run one. The number you get back will tell you exactly what to prioritise.


Layer 4: Training That Actually Changes Behaviour

Here's the honest truth about security awareness training: compliance-style training doesn't work. Annual modules, completion certificates, one-size-fits-all content — these change almost nothing in practice.

What works is continuous, scenario-based training that mirrors the real attacks your team faces. Short. Frequent. Relevant. With a simulation component that creates a real experience, not just a knowledge transfer.

The same KnowBe4 2025 report showed that organisations running ongoing simulation-plus-training programmes reduced click rates by 40% within 90 days and by 86% after 12 months — down to a 4.1% baseline. The organisations getting 3% improvement are doing annual checkbox training. The ones getting 86% improvement are doing this.

What good training looks like in practice:

  • Monthly or quarterly simulations using current attack templates
  • Immediate, non-punitive feedback when someone clicks — explain what they missed, why it worked, what to do next time
  • Short follow-up modules (5–10 minutes) triggered by simulation results, not a calendar
  • Coverage of all channels — not just email, but vishing and physical scenarios

Layer 5: Technical Controls That Support the Human Layer

Technology doesn't replace process. But it creates the environment where good habits are easier to maintain.

Least privilege access. Every person — employee, contractor, vendor — should have access only to what their specific role requires. The Coinbase breach moved through outsourced support staff who had broader access than their function required. Audit your access controls and remove what isn't needed.

Conditional access and anomaly detection. Flag logins from unusual locations, unusual hours, or unusual devices for additional verification. Flag accounts that rapidly escalate privileges after login.

Access logging. Know who accessed what, and when. The Coinbase breach went undetected for five months partly because nobody was watching for unusual access patterns in their support tooling. Logs without review are just storage costs.

DMARC, SPF, and DKIM on your email domain. This prevents attackers from spoofing your own domain to send phishing emails to your own employees. Check yours now at dmarcian.com/dmarc-inspector — it takes thirty seconds.


What to Do When an Attack Succeeds

It will. Plan for it now, not after.

When someone clicks, submits credentials, or realises they've been manipulated:

  1. Report immediately — to IT or your security contact. Speed is everything. Every hour of undetected access is an hour of lateral movement.
  2. Disconnect the device from the network.
  3. Change passwords and revoke sessions from a clean device — not the one that visited the phishing page.
  4. Review access logs for the window after the click. What did the attacker touch?
  5. No blame. If employees fear punishment for reporting, they hide incidents. Hidden incidents become catastrophic ones.

The organisations that recover fastest from social engineering attacks are not the ones with the fewest incidents. They're the ones where the first response to "I think I clicked something" is support, not interrogation.


For Startups: Where to Start When You Have No Security Team

If you're a startup with no dedicated security function, the priority order is simple:

  1. Write the verification protocol — 30 minutes, no tools required
  2. Check your DMARC record — 5 minutes
  3. Enable MFA with number matching on all accounts — 1 hour
  4. Run one phishing simulation — either GoPhish or a managed service
  5. Have one honest conversation with your team about what social engineering looks like — show them a real example from this week's posts

That's it. That's the foundation. Everything else — awareness platforms, managed simulations, access logging infrastructure — builds on top of it.

If you want to skip the setup entirely and get a professional assessment of where your team actually sits, Kuboid Secure Layer's Startup Security Foundation is specifically designed for early-stage companies that want real security outcomes without enterprise overhead.


How to Know If Your Defence Is Working

Measure these three numbers, consistently:

  • Phish-prone percentage — what portion of your team clicks on simulated phishing emails. Baseline it, then track it monthly.
  • Reporting rate — what portion of your team reports suspicious emails rather than deleting or ignoring them. Strong programmes see 60%+ reporting rates.
  • Time to report — how quickly does a suspected incident get escalated? Aim for under five minutes from receipt to flag.

If phish-prone percentage is dropping, reporting rate is rising, and time to report is shrinking — your defence is working. These are the metrics that reflect real behaviour change, not just compliance completion rates.


The Honest Summary

This week we covered every dimension of social engineering — the psychology, the techniques, the real-world breaches, the AI acceleration, the MFA bypasses. It's a lot. But every post points at the same truth: the attacks are human, and so is the defence.

The companies that do this well aren't spending more. They're being more deliberate — with their protocols, their training, their culture around reporting. None of it requires a security department. All of it requires decisions.

At Kuboid Secure Layer, social engineering simulations and human risk assessments are core to what we do. We test your team the way a real attacker would — then we help you close the gaps we find, without blame and without jargon.

Which of the five layers is your team missing right now? Drop a comment — I'd genuinely like to hear where most businesses find the biggest gap. And if you want a professional assessment rather than a self-audit, let's talk.


This is the final post in our week-long social engineering series. Read all seven posts at kuboid.in/blog.

Kuboid Secure Layer provides social engineering simulations, security awareness programmes, and startup security foundations for businesses across India and beyond. Learn more.

Vinay Kumar
Vinay Kumar
Security Researcher @ Kuboid
Get In Touch

Let's find your vulnerabilities before they do.

Tell us about your product and we'll tell you what we'd attack first. Free consultation, no commitment.

  • 📧support@kuboid.in
  • ⏱️Typical response within 24 hours
  • 🌍Serving clients globally from India
  • 🔒NDA available before any discussion
Loading form...