Sorry, you need to enable JavaScript to visit this website.

Understanding Social Engineering

This article aims to teach our children and other family members to protect their personal information.

Cyber security is a major concern these days because of advancements in the world of technology. As parents we are more concerned about our children’s exposure to the technology. Easy access to the Internet has got children and adults glued to their smart phones and computer screens for long hours. When you hear about cyber attacks in the news you are concerned about how it affects your children’s online presence. We need to guide our children in the right direction and to guide by providing them an awareness of the tactics that goes behind  major Cyber attacks.

Gone are the days when people used to break into buildings, offices and homes to steal money and valuables. Those kinds of burglars are still there, but now criminals are using the technology to execute a theft or burglary. It is not just children who are at risk; as parents we too are on the threshold of being taken in by anyone thereby  compromising our personal information. In this regard, Social Engineering is the most effective approach, where a hacker tries to gain trust of the victim and then pull them into their trap. Hence, we have to know more accurately the schemes of the Social Engineering process so that we can caution our children about it. Social Engineers don’t just use the technology to extract your information but they also do it in ways that do not arouse suspicion. These are people who monitor us without our knowledge and try to befriend us by helping us in time of need. They appear courteous in their communication without arousing our suspicion. Some social engineers try to get closer to the victim and share their personal information and expecting them to provide the same in return. They may ask for our email address and by sending regular mails, they try to establish a relationship in order to find other family details.

Some types of social engineers are not known to us, they might be following us and may be lurking behind when we are drawing cash from ATMs. If we are not mindful about the surroundings,  we may compromise the security of our information.

We sometimes carry much information in our wallets or purse and in case of a theft all your information is at someone else’s disposal. Though you might block your bank cards, they still have access to your driving license through which other information may be connected. They don’t leave any stone unturned.

Social Engineering attacks were usually carried out on business organizations to steal their confidential information, classified documents, etc. They used different techniques to hack into an organization’s system and premises. Now organizations have tightened their security and have implemented several policy controls for staff and visitors. The focus of social engineers has switched to the normal person, as they are not aware of these practices and social engineers can easily carry out their schemes.

Therefore, we are at risk and it is time that we examined the security of our personal information. We need to check our information that is available both online and offline to know whether we have secured it well. Check with whom we have shared our information and evaluate whether they are trustworthy.

As we scrutinize our information, we have to teach our children and other family members to apply the same discretion towards protection of their personal information. Keep yourself updated about the current social engineering risks and tactics to ensure the safety of your family.

Primary Keywords
Secondary Keywords
Last edited
Reading time
5 Minutes

Call to Action

Report a cybersecurity breach to Q-CERT in one of three ways: Call at +974 4493 3408, (24/7 service), email at or complete the incident reporting form at Q-CERT incident reporting form.

External Resources