{"id":8490,"date":"2026-01-15T13:06:40","date_gmt":"2026-01-15T13:06:40","guid":{"rendered":"https:\/\/phantomslab.io\/?page_id=8490"},"modified":"2026-04-14T09:31:05","modified_gmt":"2026-04-14T09:31:05","slug":"wat-is-social-engineering","status":"publish","type":"page","link":"https:\/\/phantomslab.io\/nl\/cybersecurity-awareness\/terminologie\/wat-is-social-engineering\/","title":{"rendered":"Wat is social engineering?"},"content":{"rendered":"\n<section class=\"section section none none none\" style=\"padding-top: px; padding-bottom: px\">\n    <div class=\"container\" data-aos=\"fade-up\" data-aos-duration=\"500\">\n        \n\n<h2 class=\"wp-block-heading has-text-align-left\">Definition of social engineering<\/h2>\n\n\n\n<p>Social engineering is the manipulation of people into revealing information or performing actions that compromise security. Instead of hacking systems, attackers exploit human behavior. It relies on psychological triggers such as trust, fear, urgency, and authority, making it one of the most effective cyberattack methods.<\/p>\n\n\n    <\/div>\n<\/section>\n\n\n<section class=\"section section none none none\" style=\"padding-top: px; padding-bottom: px\">\n    <div class=\"container\" data-aos=\"fade-up\" data-aos-duration=\"500\">\n        \n\n<h2 class=\"wp-block-heading\">Related terms<\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/phantomslab.io\/nl\/cybersecurity-awareness\/terminologie\/wat-is-cybersecurity-gedrag\/\" data-type=\"page\" data-id=\"4958\">What is cybersecurity behavior?<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/phantomslab.io\/nl\/cybersecurity-awareness\/terminologie\/wat-is-cybersecuritycultuur\/\" data-type=\"page\" data-id=\"4956\">What is cybersecurity culture?<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/phantomslab.io\/nl\/cybersecurity-awareness\/terminologie\/wat-is-cybersecurity-leidership\/\" data-type=\"page\" data-id=\"4954\">What is cybersecurity leadership?<\/a><\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/phantomslab.io\/nl\/cybersecurity-awareness\/terminologie\/wat-is-gamified-cybersecurity-learning\/\" data-type=\"page\" data-id=\"4976\">What is gamified cybersecurity learning?<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/phantomslab.io\/nl\/cybersecurity-awareness\/terminologie\/wat-is-cybersecurity-e-learning\/\" data-type=\"link\" data-id=\"https:\/\/phantomslab.io\/cybersecurity-awareness\/terminology\/what-is-cybersecurity-e-learning\/\">What is cybersecurity e-learning?<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/phantomslab.io\/nl\/cybersecurity-awareness\/terminologie\/wat-is-cybersecurity-entertainment\/\" data-type=\"page\" data-id=\"4972\">What is cybersecurity entertainment?<\/a><\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\">\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/phantomslab.io\/nl\/cybersecurity-awareness\/terminologie\/wat-zijn-deepfakes\/\" data-type=\"page\" data-id=\"4848\">What are deepfakes?<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/phantomslab.io\/nl\/cybersecurity-awareness\/terminologie\/wat-is-ceo-fraude\/\" data-type=\"page\" data-id=\"4841\">What is CEO fraud?<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/phantomslab.io\/nl\/cybersecurity-awareness\/terminologie\/wat-is-phishing\/\" data-type=\"page\" data-id=\"4846\">What is phishing?<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center\">Start with a definition. Continue with awareness.<\/h3>\n\n\n    <\/div>\n<\/section>\n\n\n\n<section class=\"content_block section none none none\" style=\"padding-top: px; padding-bottom: px\">\n\n    <div class=\"container\">\n        <div class=\"row\" data-aos=\"fade-up\" data-aos-duration=\"300\">\n            <div class=\"col-12 col-md-8\">\n                <div class=\"intro\">\n                    <h2>More about cybersecurity social engineering in practice<\/h2>\n                <\/div>\n            <\/div>\n            <div class=\"col-12 col-md-4\">\n                <div class=\"intro\">\n                                    <\/div>\n            <\/div>\n        <\/div>\n        <div class=\"row\" data-aos=\"fade-up\" data-aos-duration=\"500\">\n\n            <div class=\"col-12\">\n                                                        <div class=\"swiper cXDueBmJ\">\n                        <div class=\"swiper-wrapper\">\n                                                            <div class=\"swiper-slide\">\n\n                                                                            <a href=\"https:\/\/phantomslab.io\/cybersecurity-awareness\/social-engineering\/\" target=\"_self\">\n                                    \n                                        <div class=\"block\">\n                                            <div class=\"image_placeholder\">\n                                                <img decoding=\"async\" src=\"https:\/\/phantomslab.io\/wp-content\/uploads\/2026\/04\/Phantom-Event-NEW.webp\" alt=\"\">\n                                            <\/div>\n                                            <div class=\"text_placeholder\">\n                                                <h3>Cybersecurity social engineering<\/h3>\n                                                <p>Explore the impact of social engineering training within our solutions.<\/p>\n                                                                                                    <a class=\"btn alt\" href=\"https:\/\/phantomslab.io\/cybersecurity-awareness\/social-engineering\/\" target=\"_self\">\n                                                        Read more                                                    <\/a>\n                                                                                            <\/div>\n                                        <\/div>\n\n                                                                            <\/a>\n                                    \n                                <\/div>\n                                                            <div class=\"swiper-slide\">\n\n                                                                            <a href=\"https:\/\/phantomslab.io\/blogs\/what-is-the-best-cybersecurity-training\/\" target=\"_self\">\n                                    \n                                        <div class=\"block\">\n                                            <div class=\"image_placeholder\">\n                                                <img decoding=\"async\" src=\"https:\/\/phantomslab.io\/wp-content\/uploads\/2026\/04\/Phantom-Doelgroepen.webp\" alt=\"\">\n                                            <\/div>\n                                            <div class=\"text_placeholder\">\n                                                <h3>Blog: Best cybersecurity training<\/h3>\n                                                <p>What is the best cybersecurity training?<\/p>\n                                                                                                    <a class=\"btn alt\" href=\"https:\/\/phantomslab.io\/blogs\/what-is-the-best-cybersecurity-training\/\" target=\"_self\">\n                                                        Coming soon                                                    <\/a>\n                                                                                            <\/div>\n                                        <\/div>\n\n                                                                            <\/a>\n                                    \n                                <\/div>\n                                                            <div class=\"swiper-slide\">\n\n                                                                            <a href=\"https:\/\/phantomslab.io\/team\/dick-schouten\/\" target=\"_self\">\n                                    \n                                        <div class=\"block\">\n                                            <div class=\"image_placeholder\">\n                                                <img decoding=\"async\" src=\"https:\/\/phantomslab.io\/wp-content\/uploads\/2025\/10\/Dick.webp\" alt=\"\">\n                                            <\/div>\n                                            <div class=\"text_placeholder\">\n                                                <h3>Cybersecurity social engineering expert<\/h3>\n                                                <p>Meet Dick Schouten, expert in cybersecurity social engineering.<\/p>\n                                                                                                    <a class=\"btn alt\" href=\"https:\/\/phantomslab.io\/team\/dick-schouten\/\" target=\"_self\">\n                                                        Read more                                                    <\/a>\n                                                                                            <\/div>\n                                        <\/div>\n\n                                                                            <\/a>\n                                    \n                                <\/div>\n                                                    <\/div>\n                    <\/div>\n                    <div class=\"nav\" data-aos=\"fade-up\" data-aos-duration=\"600\">\n                        <div class=\"cXDueBmJ-prev prev arrow\"><\/div>\n                        <div class=\"cXDueBmJ-next next arrow\"><\/div>\n                    <\/div>\n                 \n            <\/div>\n\n        <\/div>\n    <\/div>\n\n    <script>\n        document.addEventListener('DOMContentLoaded', function () {\n            var name = \"cXDueBmJ\";\n            var swiper = new Swiper(\".\" + name, { \n                slidesPerView: 1, \n                spaceBetween: 0,\n                loop: true,\n                navigation: {\n                    nextEl: \".\" + name + \"-next\", \n                    prevEl: \".\" + name + \"-prev\", \n                },\n                breakpoints: {\n                    768: {\n                        slidesPerView: 2,\n                        spaceBetween: 30\n                    },\n                    1024: {\n                        slidesPerView: 2,\n                        spaceBetween: 30\n                    },\n                    1366: {\n                        slidesPerView: 3,\n                        spaceBetween: 30\n                    },\n                }\n            });\n        });\n    <\/script>\n\n<\/section>\n\n\n<section class=\"section section patroon_b line_btm line_top\" style=\"padding-top: 100px; padding-bottom: 100px\">\n    <div class=\"container\" data-aos=\"fade-up\" data-aos-duration=\"500\">\n        \n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:15%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:70%\">\n<h2 class=\"wp-block-heading has-text-align-center\">From manipulation tactics to human resilience<\/h2>\n\n\n\n<p class=\"has-text-align-center\">Social engineering targets people, not systems. Learn how <a href=\"\/\">Phantom\u2019sLab<\/a> helps organizations understand psychology and change behavior.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-fill\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/phantomslab.io\/nl\/demo\/\">Start with a free trial<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/phantomslab.io\/nl\/cybersecurity-awareness\/terminologie\/\">Go back to Cybersecurity terminology<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:15%\"><\/div>\n<\/div>\n\n\n    <\/div>\n<\/section>\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":7592,"parent":8100,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"class_list":["post-8490","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/phantomslab.io\/nl\/wp-json\/wp\/v2\/pages\/8490","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/phantomslab.io\/nl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/phantomslab.io\/nl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/phantomslab.io\/nl\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/phantomslab.io\/nl\/wp-json\/wp\/v2\/comments?post=8490"}],"version-history":[{"count":1,"href":"https:\/\/phantomslab.io\/nl\/wp-json\/wp\/v2\/pages\/8490\/revisions"}],"predecessor-version":[{"id":8491,"href":"https:\/\/phantomslab.io\/nl\/wp-json\/wp\/v2\/pages\/8490\/revisions\/8491"}],"up":[{"embeddable":true,"href":"https:\/\/phantomslab.io\/nl\/wp-json\/wp\/v2\/pages\/8100"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/phantomslab.io\/nl\/wp-json\/wp\/v2\/media\/7592"}],"wp:attachment":[{"href":"https:\/\/phantomslab.io\/nl\/wp-json\/wp\/v2\/media?parent=8490"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}