When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.

Pretexting, baiting, tailgating or quid pro quo are all example terms of broader social engineering.

Once inside, the attacker can gain access to documents or breach the data pipe via a cyberattack.

A person sat at a computer and a tablet, coding

Dont let anyone follow you into the building unless you know and recognize them.

Dont give out building codes or gate codes to anyone you dont know.

If someone looks like theyre delivering something, check that theyre escorted to the appropriate location.

A SanDisk USB flash drive plugged into the USB port of a laptop sitting next to another SanDisk USB flash drive

Enabletwo-factoror multi-factor authentication wherever possible, on all your devices.

This reduces the risk that an attacker can access your accounts and limits the damage that can be done.

Remember to learn to listen to your instincts.

customer support agent speaking on headset

If something seems suspicious ortoo good to be true, it probably is.

And even if an email comes through that seems to be from someone you know, check first.

More from Tom’s Guide

A woman looking at a smartphone while using a laptop

Arrow

An image of a CAPTCHA

A hacker typing on a computer

A person typing on a computer while hackers use phishing to steal a file from their computer

Green skull on smartphone screen.

mobile security

Galaxy S25 Plus held in the hand.

iPhone 16 Pro shown held in hand

A woman�s hands holding a smartphone with a lock symbol on it, in front of a laptop that also has a lock symbol on it.

Nintendo Switch 2

Motorola Razr 2024 Review.

iPhone 16 Pro Max, Galaxy S25 Ultra and Pixel 9 Pro

Close-up of the Samsung Galaxy Watch 7 on a user�s wrist next to the Garmin Vivoactive 6

A person holding a Nintendo Switch 2 playing Mario Kart World

Carhartt apparel for men and women