Humans Are Under Attack: How Cybercriminals are Targeting People Instead of Machines
- John W. Harmon, PhD

- 32 minutes ago
- 3 min read
Cybersecurity has long focused on protecting machines, networks, and software from attacks. Yet, a growing trend shows cybercriminals shifting their focus from technology to the most vulnerable point in any system: people. This shift means that the human layer is now the primary target. Understanding this change is crucial for small and medium-sized businesses (SMBs) that often lack the resources of larger enterprises but face the same risks.

Why Cybercriminals Target People
Machines can be hardened with firewalls, antivirus software, and patches. People, however, are often the weakest link. Cybercriminals exploit human psychology, using deception and manipulation to bypass technical defenses. This approach is known as social engineering.
Common tactics include:
Phishing emails that trick users into revealing passwords or clicking malicious links.
Pretexting, where attackers create a fabricated scenario to gain trust.
Baiting, offering something enticing to lure victims into traps.
Tailgating, physically following someone into a secure area.
These methods rely on human error rather than technical flaws, making them harder to defend against with traditional cybersecurity tools.
Examples of Human-Targeted Attacks
Phishing and Spear Phishing
Phishing remains the most widespread attack on the human layer. Attackers send mass emails pretending to be trusted entities like banks or service providers. These emails often contain urgent messages prompting users to act quickly, such as resetting passwords or confirming account details.
Spear phishing takes this further by targeting specific individuals or companies with personalized messages. For example, an attacker might impersonate a company executive and request a wire transfer from the finance department. In 2020, the FBI reported that business email compromise scams caused over $1.8 billion in losses, mostly through such targeted attacks.
Social Media Manipulation
Cybercriminals use social media to gather personal information and build trust. They may pose as friends or colleagues to send malicious links or requests. This tactic exploits the natural human tendency to trust familiar contacts.
Insider Threats
Sometimes, the threat comes from within. Employees with access to sensitive information can be manipulated, bribed, or coerced into leaking data. SMBs often overlook insider risks, but they can be devastating when combined with social engineering.
How SMBs Can Protect Their People
Small and medium businesses face unique challenges in cybersecurity. Limited budgets and staff mean they cannot rely solely on advanced technology. Instead, they must focus on strengthening the human layer.
Training and Awareness
Regular training helps employees recognize and respond to social engineering attempts. Effective programs include:
Realistic phishing simulations to test and improve vigilance.
Clear guidelines on handling sensitive information.
Encouraging a culture where employees report suspicious activity without fear.
Strong Authentication Practices
Using multi-factor authentication (MFA) reduces the risk of compromised credentials. Even if a password is stolen, MFA adds an extra barrier.
Clear Communication Channels
Establish trusted methods for verifying requests, especially those involving money or sensitive data. For example, confirm wire transfer requests with a phone call to a known contact.
Limit Access and Privileges
Apply the principle of least privilege, giving employees access only to the information and systems they need. This limits damage if an account is compromised.

The Role of Technology in Supporting the Human Layer
While the focus is on people, technology still plays a vital role. Tools that support human vigilance include:
Email filters that catch phishing attempts before they reach inboxes.
Endpoint detection to spot unusual behavior on devices.
Security awareness platforms that deliver ongoing training and track progress.
Technology should complement human efforts, not replace them.
Building a Resilient Cybersecurity Culture
The best defense against attacks on the human layer is a strong cybersecurity culture. This means:
Leadership commitment to cybersecurity as a priority.
Open communication about threats and incidents.
Empowering employees to take responsibility for security.
When everyone understands their role, the entire organization becomes harder to breach.
Final Thoughts
Cybercriminals are increasingly targeting people because it is often easier than attacking machines. SMBs must recognize this shift and invest in protecting their human layer. Training, clear policies, and supportive technology create a strong defense that reduces risk.
📅 Start here - book your time now:



Comments