{"id":39828,"date":"2025-12-11T13:54:29","date_gmt":"2025-12-11T12:54:29","guid":{"rendered":"https:\/\/smartfense.com\/blog\/por-que-seguimos-cayendo-en-ingenieria-social\/"},"modified":"2025-12-18T13:46:34","modified_gmt":"2025-12-18T12:46:34","slug":"why-do-we-keep-falling-for-social-engineering","status":"publish","type":"post","link":"https:\/\/smartfense.com\/en\/blog\/why-do-we-keep-falling-for-social-engineering\/","title":{"rendered":"Why Do We Keep Falling for Social Engineering?"},"content":{"rendered":"<p data-start=\"252\" data-end=\"425\">Even when we use filters and security tools, social engineering keeps working for one simple reason: it doesn\u2019t attack technology first\u2014it attacks how people make decisions.<\/p>\n<p data-start=\"427\" data-end=\"820\">In many incidents, the entry point isn\u2019t a technical vulnerability. It\u2019s a human action: clicking a link, sharing credentials, forwarding information, or approving a request. This doesn\u2019t happen because of bad intentions. It happens because, in our day-to-day work, we rely on mental shortcuts that help us move fast\u2014but can also work against us. These shortcuts are known as cognitive biases.<\/p>\n<p data-start=\"822\" data-end=\"984\">Understanding them changes the approach. It\u2019s not just about informing or reminding people of best practices. It\u2019s about training real decisions in real contexts.<\/p>\n<h3 data-start=\"986\" data-end=\"1041\"><strong data-start=\"990\" data-end=\"1041\">The Biases Social Engineering Exploits the Most<\/strong><\/h3>\n<p data-start=\"1043\" data-end=\"1425\"><strong data-start=\"1043\" data-end=\"1057\">Authority.<\/strong><br data-start=\"1057\" data-end=\"1060\" \/>We tend to trust messages that appear to come from someone important or official\u2014Executive leadership, HR, Finance, a critical vendor, or a public institution. Attackers replicate realistic signatures, corporate tones, and messages that demand immediate action. If our programs don\u2019t train these scenarios, it\u2019s hard to develop the habit of verifying before acting.<\/p>\n<p data-start=\"1427\" data-end=\"1766\"><strong data-start=\"1427\" data-end=\"1439\">Urgency.<\/strong><br data-start=\"1439\" data-end=\"1442\" \/>When we feel rushed, we analyze less and act on autopilot. Messages like \u201cyour account will be locked in 24 hours\u201d or \u201cmust be completed by end of day\u201d are designed to suppress critical thinking. This bias is even stronger during periods of high workload or constant interruptions\u2014very common conditions in any organization.<\/p>\n<p data-start=\"1768\" data-end=\"2032\"><strong data-start=\"1768\" data-end=\"1792\">Reward and scarcity.<\/strong><br data-start=\"1792\" data-end=\"1795\" \/>When a message promises a benefit or limited access, the brain often focuses more on the potential reward than on the risk. That\u2019s why emails about bonuses, prizes, exclusive access, or opportunities that \u201cexpire today\u201d are so effective.<\/p>\n<p data-start=\"2034\" data-end=\"2298\"><strong data-start=\"2034\" data-end=\"2051\">Confirmation.<\/strong><br data-start=\"2051\" data-end=\"2054\" \/>When a message aligns with what we were already expecting\u2014an ongoing project, a real supplier, an upcoming audit\u2014our suspicion drops. This explains why targeted attacks that use public information or familiar context tend to be more successful.<\/p>\n<p data-start=\"2300\" data-end=\"2513\"><strong data-start=\"2300\" data-end=\"2325\">Unrealistic optimism.<\/strong><br data-start=\"2325\" data-end=\"2328\" \/>Sometimes the thought appears: \u201cthis won\u2019t happen to us.\u201d That overconfidence reduces attention to subtle warning signs and also lowers the likelihood of reporting something suspicious.<\/p>\n<h3 data-start=\"2515\" data-end=\"2591\"><strong data-start=\"2519\" data-end=\"2591\">When Awareness Programs Don\u2019t Help (and Sometimes Make Things Worse)<\/strong><\/h3>\n<p data-start=\"2593\" data-end=\"3049\">There are common practices that create a sense of compliance but don\u2019t change behavior in real situations. One-off annual courses inform, but they don\u2019t train decisions under pressure. Single or overly predictable simulations produce misleading metrics. If corporate tools also generate false positives, the data becomes noisy and analysis loses value. And without immediate feedback, it\u2019s hard to understand which bias was triggered and how to correct it.<\/p>\n<p data-start=\"3051\" data-end=\"3158\">To reduce human risk, information alone isn\u2019t enough. We need training, accurate measurement, and feedback.<\/p>\n<h3 data-start=\"3160\" data-end=\"3217\"><strong data-start=\"3164\" data-end=\"3217\">What a Modern Strategy Needs to Make a Difference<\/strong><\/h3>\n<p data-start=\"3219\" data-end=\"3487\"><strong data-start=\"3219\" data-end=\"3255\">Accurate, realistic simulations.<\/strong><br data-start=\"3255\" data-end=\"3258\" \/>An annual campaign isn\u2019t enough. We need variety in themes, persuasion techniques, and context to observe how biases play out day to day. Static approaches create an illusion of progress and fail to reveal real behavior patterns.<\/p>\n<p data-start=\"3489\" data-end=\"3737\"><strong data-start=\"3489\" data-end=\"3514\">Reliable measurement.<\/strong><br data-start=\"3514\" data-end=\"3517\" \/>If we don\u2019t filter non-human interactions or false positives, decisions end up being based on noise. Measuring well is just as important as simulating well, because priorities and improvement actions depend on that data.<\/p>\n<p data-start=\"3739\" data-end=\"4124\"><strong data-start=\"3739\" data-end=\"3784\">Adaptive training and immediate feedback.<\/strong><br data-start=\"3784\" data-end=\"3787\" \/>Not everyone falls for the same thing. Some people are more vulnerable to urgency, others to authority. Effective programs adapt training based on real performance, deliver short interventions at the right moment, and provide immediate feedback after a risky action. This turns awareness into a continuous process\u2014not an annual checkbox.<\/p>\n<h3 data-start=\"4126\" data-end=\"4166\"><strong data-start=\"4130\" data-end=\"4166\">Reporting as Part of the Defense<\/strong><\/h3>\n<p data-start=\"4168\" data-end=\"4445\">Beyond recognizing warning signs, it\u2019s essential to make the next safe action easy: reporting suspicious activity. When reporting is simple, friction drops, participation increases, and the security team can respond faster. Immediate feedback helps turn reporting into a habit.<\/p>\n<h3 data-start=\"4447\" data-end=\"4465\"><strong data-start=\"4451\" data-end=\"4465\">Conclusion<\/strong><\/h3>\n<p data-start=\"4467\" data-end=\"4792\">We keep falling for social engineering because attacks are designed to exploit deeply rooted and perfectly human cognitive biases. The solution isn\u2019t just reminding people of best practices. It\u2019s about shaping decisions under pressure, measuring real behavior with reliable data, and adjusting the strategy based on evidence.<\/p>\n<p data-start=\"4794\" data-end=\"4908\">In an environment where attackers increasingly understand how we decide, our defense must evolve at the same pace.<\/p>\n<h4 data-start=\"4794\" data-end=\"4908\">Sources<\/h4>\n<ul>\n<li data-start=\"4922\" data-end=\"4975\">\n<p data-start=\"4924\" data-end=\"4975\">Verizon, <em data-start=\"4933\" data-end=\"4973\">Data Breach Investigations Report 2024<\/em><\/p>\n<\/li>\n<li data-start=\"4976\" data-end=\"5010\">\n<p data-start=\"4978\" data-end=\"5010\">ENISA, <em data-start=\"4985\" data-end=\"5008\">Threat Landscape 2024<\/em><\/p>\n<\/li>\n<li data-start=\"5011\" data-end=\"5055\">\n<p data-start=\"5013\" data-end=\"5055\">Microsoft, <em data-start=\"5024\" data-end=\"5053\">Digital Defense Report 2024<\/em><\/p>\n<\/li>\n<li data-start=\"5056\" data-end=\"5098\">\n<p data-start=\"5058\" data-end=\"5098\">IBM, <em data-start=\"5063\" data-end=\"5098\">Cost of a Data Breach Report 2024<\/em><\/p>\n<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Even when we use filters and security tools, social engineering keeps working for one simple reason: it doesn\u2019t attack technology first\u2014it attacks how people make decisions. In many incidents, the [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":39826,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[686],"tags":[2105,1572,2106,1131,2104,849,1547,2107,1725,1137],"class_list":["post-39828","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-behavioral-security","tag-cognitive-biases","tag-cyber-defense","tag-cybersecurity-awareness","tag-human-risk","tag-phishing-en","tag-phishing-simulations","tag-risk-management","tag-security-culture","tag-social-engineering"],"acf":[],"yoast_head":" \n<title>Why Do We Keep Falling for Social Engineering? - SMARTFENSE - Awareness in Cyber Security<\/title>\n<meta name=\"description\" content=\"behavioral security, cognitive biases, cyber defense, cybersecurity awareness, human risk, phishing, phishing simulations, risk management, Security Culture, Social Engineering - Even when we use filters and security tools, social engineering keeps working for one simple reason: it doesn\u2019t attack technology first\u2014it attacks how Why social engineering still works despite security tools. Learn how cognitive biases drive human risk and how modern awareness strategies can truly change behavior.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/smartfense.com\/en\/blog\/why-do-we-keep-falling-for-social-engineering\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Do We Keep Falling for Social Engineering? - SMARTFENSE - Awareness in Cyber Security\" \/>\n<meta property=\"og:description\" content=\"behavioral security, cognitive biases, cyber defense, cybersecurity awareness, human risk, phishing, phishing simulations, risk management, Security Culture, Social Engineering - Even when we use filters and security tools, social engineering keeps working for one simple reason: it doesn\u2019t attack technology first\u2014it attacks how Why social engineering still works despite security tools. Learn how cognitive biases drive human risk and how modern awareness strategies can truly change behavior.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/smartfense.com\/en\/blog\/why-do-we-keep-falling-for-social-engineering\/\" \/>\n<meta property=\"og:site_name\" content=\"SMARTFENSE - Awareness in Cyber Security\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-11T12:54:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-18T12:46:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/smartfense.com\/file\/2025\/12\/ingenieria-social.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Paula Espinosa\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Paula Espinosa\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/smartfense.com\\\/en\\\/blog\\\/why-do-we-keep-falling-for-social-engineering\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/smartfense.com\\\/en\\\/blog\\\/why-do-we-keep-falling-for-social-engineering\\\/\"},\"author\":{\"name\":\"Paula Espinosa\",\"@id\":\"https:\\\/\\\/smartfense.com\\\/en\\\/#\\\/schema\\\/person\\\/57cbe1787662957ba34c101467b054f5\"},\"headline\":\"Why Do We Keep Falling for Social Engineering?\",\"datePublished\":\"2025-12-11T12:54:29+00:00\",\"dateModified\":\"2025-12-18T12:46:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/smartfense.com\\\/en\\\/blog\\\/why-do-we-keep-falling-for-social-engineering\\\/\"},\"wordCount\":731,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/smartfense.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/smartfense.com\\\/en\\\/blog\\\/why-do-we-keep-falling-for-social-engineering\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/smartfense.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/ingenieria-social.jpg\",\"keywords\":[\"behavioral security\",\"cognitive biases\",\"cyber defense\",\"cybersecurity awareness\",\"human risk\",\"phishing\",\"phishing simulations\",\"risk management\",\"Security Culture\",\"Social Engineering\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/smartfense.com\\\/en\\\/blog\\\/why-do-we-keep-falling-for-social-engineering\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/smartfense.com\\\/en\\\/blog\\\/why-do-we-keep-falling-for-social-engineering\\\/\",\"url\":\"https:\\\/\\\/smartfense.com\\\/en\\\/blog\\\/why-do-we-keep-falling-for-social-engineering\\\/\",\"name\":\"Why Do We Keep Falling for Social Engineering? - SMARTFENSE - Awareness in Cyber Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/smartfense.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/smartfense.com\\\/en\\\/blog\\\/why-do-we-keep-falling-for-social-engineering\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/smartfense.com\\\/en\\\/blog\\\/why-do-we-keep-falling-for-social-engineering\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/smartfense.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/ingenieria-social.jpg\",\"datePublished\":\"2025-12-11T12:54:29+00:00\",\"dateModified\":\"2025-12-18T12:46:34+00:00\",\"description\":\"behavioral security, cognitive biases, cyber defense, cybersecurity awareness, human risk, phishing, phishing simulations, risk management, Security Culture, Social Engineering - Even when we use filters and security tools, social engineering keeps working for one simple reason: it doesn\u2019t attack technology first\u2014it attacks how Why social engineering still works despite security tools. Learn how cognitive biases drive human risk and how modern awareness strategies can truly change behavior.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/smartfense.com\\\/en\\\/blog\\\/why-do-we-keep-falling-for-social-engineering\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/smartfense.com\\\/en\\\/blog\\\/why-do-we-keep-falling-for-social-engineering\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/smartfense.com\\\/en\\\/blog\\\/why-do-we-keep-falling-for-social-engineering\\\/#primaryimage\",\"url\":\"https:\\\/\\\/smartfense.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/ingenieria-social.jpg\",\"contentUrl\":\"https:\\\/\\\/smartfense.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/ingenieria-social.jpg\",\"width\":1200,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/smartfense.com\\\/en\\\/blog\\\/why-do-we-keep-falling-for-social-engineering\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/smartfense.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why Do We Keep Falling for Social Engineering?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/smartfense.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/smartfense.com\\\/en\\\/\",\"name\":\"SMARTFENSE - Concienciaci\u00f3n en Ciberseguridad\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/smartfense.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/smartfense.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/smartfense.com\\\/en\\\/#organization\",\"name\":\"SMARTFENSE\",\"url\":\"https:\\\/\\\/smartfense.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/smartfense.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/smartfense.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/logo-smartfense-240x40-1.png\",\"contentUrl\":\"https:\\\/\\\/smartfense.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/logo-smartfense-240x40-1.png\",\"width\":241,\"height\":40,\"caption\":\"SMARTFENSE\"},\"image\":{\"@id\":\"https:\\\/\\\/smartfense.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/smartfense.com\\\/en\\\/#\\\/schema\\\/person\\\/57cbe1787662957ba34c101467b054f5\",\"name\":\"Paula Espinosa\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5b30969a8c38ca4fe7cc8ddafa2a30a6806edb13d4909d5a9223f0036f1309bb?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5b30969a8c38ca4fe7cc8ddafa2a30a6806edb13d4909d5a9223f0036f1309bb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5b30969a8c38ca4fe7cc8ddafa2a30a6806edb13d4909d5a9223f0036f1309bb?s=96&d=mm&r=g\",\"caption\":\"Paula Espinosa\"},\"description\":\"Paula Espinosa es especialista en marketing de contenidos y concienciaci\u00f3n en ciberseguridad, con m\u00e1s de 6 a\u00f1os de experiencia en IT y B2B. Trabaja en estrategias de SEO, generaci\u00f3n de leads y comunicaci\u00f3n digital para empresas tecnol\u00f3gicas y de ciberseguridad.\",\"url\":\"https:\\\/\\\/smartfense.com\\\/en\\\/author\\\/paula\\\/\"}]}<\/script>\n ","yoast_head_json":{"title":"Why Do We Keep Falling for Social Engineering? - SMARTFENSE - Awareness in Cyber Security","description":"behavioral security, cognitive biases, cyber defense, cybersecurity awareness, human risk, phishing, phishing simulations, risk management, Security Culture, Social Engineering - Even when we use filters and security tools, social engineering keeps working for one simple reason: it doesn\u2019t attack technology first\u2014it attacks how Why social engineering still works despite security tools. Learn how cognitive biases drive human risk and how modern awareness strategies can truly change behavior.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/smartfense.com\/en\/blog\/why-do-we-keep-falling-for-social-engineering\/","og_locale":"en_US","og_type":"article","og_title":"Why Do We Keep Falling for Social Engineering? - SMARTFENSE - Awareness in Cyber Security","og_description":"behavioral security, cognitive biases, cyber defense, cybersecurity awareness, human risk, phishing, phishing simulations, risk management, Security Culture, Social Engineering - Even when we use filters and security tools, social engineering keeps working for one simple reason: it doesn\u2019t attack technology first\u2014it attacks how Why social engineering still works despite security tools. Learn how cognitive biases drive human risk and how modern awareness strategies can truly change behavior.","og_url":"https:\/\/smartfense.com\/en\/blog\/why-do-we-keep-falling-for-social-engineering\/","og_site_name":"SMARTFENSE - Awareness in Cyber Security","article_published_time":"2025-12-11T12:54:29+00:00","article_modified_time":"2025-12-18T12:46:34+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/smartfense.com\/file\/2025\/12\/ingenieria-social.jpg","type":"image\/jpeg"}],"author":"Paula Espinosa","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Paula Espinosa","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/smartfense.com\/en\/blog\/why-do-we-keep-falling-for-social-engineering\/#article","isPartOf":{"@id":"https:\/\/smartfense.com\/en\/blog\/why-do-we-keep-falling-for-social-engineering\/"},"author":{"name":"Paula Espinosa","@id":"https:\/\/smartfense.com\/en\/#\/schema\/person\/57cbe1787662957ba34c101467b054f5"},"headline":"Why Do We Keep Falling for Social Engineering?","datePublished":"2025-12-11T12:54:29+00:00","dateModified":"2025-12-18T12:46:34+00:00","mainEntityOfPage":{"@id":"https:\/\/smartfense.com\/en\/blog\/why-do-we-keep-falling-for-social-engineering\/"},"wordCount":731,"commentCount":0,"publisher":{"@id":"https:\/\/smartfense.com\/en\/#organization"},"image":{"@id":"https:\/\/smartfense.com\/en\/blog\/why-do-we-keep-falling-for-social-engineering\/#primaryimage"},"thumbnailUrl":"https:\/\/smartfense.com\/file\/2025\/12\/ingenieria-social.jpg","keywords":["behavioral security","cognitive biases","cyber defense","cybersecurity awareness","human risk","phishing","phishing simulations","risk management","Security Culture","Social Engineering"],"articleSection":["Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/smartfense.com\/en\/blog\/why-do-we-keep-falling-for-social-engineering\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/smartfense.com\/en\/blog\/why-do-we-keep-falling-for-social-engineering\/","url":"https:\/\/smartfense.com\/en\/blog\/why-do-we-keep-falling-for-social-engineering\/","name":"Why Do We Keep Falling for Social Engineering? - SMARTFENSE - Awareness in Cyber Security","isPartOf":{"@id":"https:\/\/smartfense.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/smartfense.com\/en\/blog\/why-do-we-keep-falling-for-social-engineering\/#primaryimage"},"image":{"@id":"https:\/\/smartfense.com\/en\/blog\/why-do-we-keep-falling-for-social-engineering\/#primaryimage"},"thumbnailUrl":"https:\/\/smartfense.com\/file\/2025\/12\/ingenieria-social.jpg","datePublished":"2025-12-11T12:54:29+00:00","dateModified":"2025-12-18T12:46:34+00:00","description":"behavioral security, cognitive biases, cyber defense, cybersecurity awareness, human risk, phishing, phishing simulations, risk management, Security Culture, Social Engineering - Even when we use filters and security tools, social engineering keeps working for one simple reason: it doesn\u2019t attack technology first\u2014it attacks how Why social engineering still works despite security tools. Learn how cognitive biases drive human risk and how modern awareness strategies can truly change behavior.","breadcrumb":{"@id":"https:\/\/smartfense.com\/en\/blog\/why-do-we-keep-falling-for-social-engineering\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/smartfense.com\/en\/blog\/why-do-we-keep-falling-for-social-engineering\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/smartfense.com\/en\/blog\/why-do-we-keep-falling-for-social-engineering\/#primaryimage","url":"https:\/\/smartfense.com\/file\/2025\/12\/ingenieria-social.jpg","contentUrl":"https:\/\/smartfense.com\/file\/2025\/12\/ingenieria-social.jpg","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/smartfense.com\/en\/blog\/why-do-we-keep-falling-for-social-engineering\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/smartfense.com\/en\/"},{"@type":"ListItem","position":2,"name":"Why Do We Keep Falling for Social Engineering?"}]},{"@type":"WebSite","@id":"https:\/\/smartfense.com\/en\/#website","url":"https:\/\/smartfense.com\/en\/","name":"SMARTFENSE - Concienciaci\u00f3n en Ciberseguridad","description":"","publisher":{"@id":"https:\/\/smartfense.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/smartfense.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/smartfense.com\/en\/#organization","name":"SMARTFENSE","url":"https:\/\/smartfense.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/smartfense.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/smartfense.com\/file\/2023\/08\/logo-smartfense-240x40-1.png","contentUrl":"https:\/\/smartfense.com\/file\/2023\/08\/logo-smartfense-240x40-1.png","width":241,"height":40,"caption":"SMARTFENSE"},"image":{"@id":"https:\/\/smartfense.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/smartfense.com\/en\/#\/schema\/person\/57cbe1787662957ba34c101467b054f5","name":"Paula Espinosa","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/5b30969a8c38ca4fe7cc8ddafa2a30a6806edb13d4909d5a9223f0036f1309bb?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5b30969a8c38ca4fe7cc8ddafa2a30a6806edb13d4909d5a9223f0036f1309bb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5b30969a8c38ca4fe7cc8ddafa2a30a6806edb13d4909d5a9223f0036f1309bb?s=96&d=mm&r=g","caption":"Paula Espinosa"},"description":"Paula Espinosa es especialista en marketing de contenidos y concienciaci\u00f3n en ciberseguridad, con m\u00e1s de 6 a\u00f1os de experiencia en IT y B2B. Trabaja en estrategias de SEO, generaci\u00f3n de leads y comunicaci\u00f3n digital para empresas tecnol\u00f3gicas y de ciberseguridad.","url":"https:\/\/smartfense.com\/en\/author\/paula\/"}]}},"_links":{"self":[{"href":"https:\/\/smartfense.com\/en\/wp-json\/wp\/v2\/posts\/39828","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smartfense.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smartfense.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smartfense.com\/en\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/smartfense.com\/en\/wp-json\/wp\/v2\/comments?post=39828"}],"version-history":[{"count":2,"href":"https:\/\/smartfense.com\/en\/wp-json\/wp\/v2\/posts\/39828\/revisions"}],"predecessor-version":[{"id":39830,"href":"https:\/\/smartfense.com\/en\/wp-json\/wp\/v2\/posts\/39828\/revisions\/39830"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smartfense.com\/en\/wp-json\/wp\/v2\/media\/39826"}],"wp:attachment":[{"href":"https:\/\/smartfense.com\/en\/wp-json\/wp\/v2\/media?parent=39828"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smartfense.com\/en\/wp-json\/wp\/v2\/categories?post=39828"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smartfense.com\/en\/wp-json\/wp\/v2\/tags?post=39828"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}