For Small Business

Social Engineering Targeting SMBs: Tactics, Trends and Simple Defenses

Published April 27, 2026 · 9 min read · By the ScamDrill Team
Editorial cover graphic on a soft-mint background. Headline reads ‘The con doesn’t break in. It just introduces itself.’ Beside it, a forged visitor badge reading ‘Hello, I’m from your IT vendor — Mark, Support’ is stamped ‘Forged.’

Most small-business breaches don’t start with someone exploiting a zero-day. They start with a polite voicemail, a slightly off invoice, or a text that looks like it’s from FedEx. The attackers aren’t breaking in. They’re being let in.

That’s the premise behind social engineering. Instead of attacking the technology, you attack the person in front of it. It works especially well against small and mid-sized businesses, which tend to hold the data of an enterprise but run with the controls of a household.

68% Share of breaches in 2024 that involved a non-malicious human element. That means an employee being phished, deceived, or pretexted into action.
Source: Verizon 2024 Data Breach Investigations Report

What social engineering actually is

Social engineering is when an attacker manipulates a person into doing something that hurts the business: clicking a link, paying a fake invoice, resetting a password for someone they’ve never met, or escorting an unbadged “contractor” into a server room. CISA calls it “the art of human hacking.” Verizon’s annual breach data has shown for over a decade that it features in the majority of incidents that actually cost money.

If you run a small business, the working definition is even simpler. It’s the part of every breach that doesn’t need an exploit. Just a believable story.

Why SMBs are the soft target

The Hiscox 2024 Cyber Readiness Report found that 41% of small businesses experienced a cyberattack in the previous 12 months, up from 38% the year before. The FBI’s 2024 IC3 report logged $2.77 billion in business email compromise (BEC) losses, with a median wire amount around $50,000. Small enough to slip past a one-person finance department, large enough to hurt.

A few reasons SMBs get hit harder than the headlines suggest:

The tactics to watch for

1. Phishing and spear-phishing email

Email is still doing most of the work. The 2024 DBIR found the median time for someone to click a phishing link is under 60 seconds, and the median time to type credentials into the spoofed page is under 90. Modern spear-phishing leans on LLMs to mirror your tone, your invoice format, and (when the attacker already has access to a compromised mailbox) your real client list.

2. Business email compromise & vendor email compromise

BEC has been the FBI’s most lucrative cybercrime category for seven years running. The fastest-growing variant for SMBs is vendor email compromise. An attacker hijacks a real supplier’s mailbox, waits for an in-flight invoice thread, and quietly replies with updated banking details. There’s no spoofed domain to spot. The email really is from your vendor.

3. Voice phishing (vishing) and deepfake voice

In 2024, an employee at engineering firm Arup transferred $25 million after a video call with what looked like the company’s CFO. The CFO was a deepfake. Smaller versions of this story show up at SMBs every month: a 30-second voice clone of the owner, lifted from a podcast or webinar, calling the bookkeeper to release a held wire.

4. Smishing and quishing

Text-message phishing (“smishing”) impersonating shipping carriers, payroll providers, and Microsoft 365 password resets has surged. The FTC logged hundreds of millions in losses to text-based scams in 2024. The newer variant is quishing: QR codes embedded in PDFs, parking tickets, or break-room flyers that route to credential-harvesting pages.

5. Help-desk and pretext calls

Several of the biggest breaches of 2023 and 2024 (MGM, Caesars, Clorox, Change Healthcare) started with a phone call to a help desk. The attacker poses as an employee locked out of their account and talks the agent into resetting MFA. The same script works on SMBs whose IT is outsourced to an MSP, often with less verification, not more.

6. Physical pretexting and tailgating

The forged-vendor-badge scenario is not theatrical. CompTIA’s 2024 SMB security survey found that 26% of SMBs had experienced an in-person social-engineering attempt in the previous year. Think the “new MSP technician” nobody scheduled, the fake fire-marshal walk-through, the USB stick dropped in the parking lot.

Red flags shared by every social-engineering attempt

What’s new in 2026

AI personalization is now the default. Microsoft’s 2024 Digital Defense Report and CrowdStrike’s 2025 Global Threat Report both flagged generative AI as the biggest accelerant of social-engineering volume and quality. Spelling errors used to be a tell. Now the copy is clean and the tone matches yours.

Deepfake audio and video have gotten cheap. What used to need a Hollywood pipeline now needs a 30-second voice sample and around $20 of cloud time.

MFA fatigue and adversary-in-the-middle (AiTM) phishing. Cisco Talos and Microsoft both report 146% year-over-year growth in AiTM phishing kits through 2024. These kits steal session cookies and walk right past standard SMS or app-based MFA.

Supply-chain pretexting. Attackers increasingly go after the vendor with the weakest controls (your MSP, your payroll provider, your bookkeeper) and use that trusted relationship to pivot into your environment.

Steps you can take this quarter

None of the steps below need enterprise software. Most fit on a one-page policy your team will actually read.

  1. Require an out-of-band callback for every payment change. Wire instructions, ACH details, and vendor banking updates only get processed after a phone confirmation, using a number from a pre-verified contact list. Not a number in the requesting email.
  2. Move to phishing-resistant MFA. Replace SMS and app-push MFA on email, banking, and admin systems with passkeys or FIDO2 hardware keys. AiTM kits don’t beat them.
  3. Publish a no-blame reporting culture. The best predictor of a small breach not becoming a large one is how fast someone reports it. A culture that punishes clickers gets fewer reports, not fewer clicks.
  4. Run monthly phishing simulations with a 60-second debrief. Annual training has roughly zero impact on click rate. Ongoing simulations cut it by 70 to 90% within a year. See our SMB phishing-training guide for specifics.
  5. Set a code word for high-stakes voice requests. A shared phrase between owner, CFO, and bookkeeper neutralizes voice-clone wire fraud at near-zero cost.
  6. Lock down your domain. Enforce DMARC at “reject,” enable SPF and DKIM, and watch for lookalike domains. Your name will be impersonated. Make it hard.
  7. Train the help desk specifically. A two-page script for verifying password and MFA resets (what to ask, what to refuse) closes the same door that took down half a dozen Fortune 500s last year.

Practice beats policy.

ScamDrill’s organization plans send realistic, current-threat phishing simulations to your team and turn every “oops” into a 60-second teaching moment. When a real attack lands, it lands on a trained inbox.

See the organization plan →

What it comes down to

Every breach you’ll read about in 2026 will technically be a phishing problem, a vendor problem, or an MFA problem. Underneath, almost all of them are the same thing: someone trusted a story they shouldn’t have. The defenses aren’t exotic. They’re a callback policy, a passkey, a code word, and a culture that reports small mistakes before they get big.

If you only do one thing this quarter, write the callback policy. If you have time for two, run a phishing simulation. The attackers have already automated their side. Automating yours costs less than the median wire they’re trying to steal.

For deeper rollouts, see our small-business phishing training program and the 30-day simulation rollout plan. For the consumer side of the same playbook (AI voice clones aimed at families), see our AI voice cloning guide.

Frequently asked questions

What is social engineering, in plain language?

Social engineering is the manipulation of a person — not a computer — into doing something that compromises a business: clicking a malicious link, wiring money to a fake vendor, sharing credentials, or letting a stranger into a server room. Verizon's 2024 Data Breach Investigations Report attributes roughly 68% of breaches to a non-malicious human element such as a person being deceived, and CISA estimates social-engineering elements appear in the overwhelming majority of cyberattacks. For an SMB, the practical definition is simpler: it's the part of every breach that doesn't require an exploit — just a believable story.

Why do attackers go after small and mid-sized businesses?

Three reasons. First, SMBs hold the same valuable data as enterprises — customer PII, banking credentials, supplier relationships — but with thinner defenses and no 24/7 SOC. Second, attacks are now automated; ransomware affiliates and BEC crews don't pick targets by name, they pick by exposed VPN, weak MFA, and lookalike domains. Third, SMBs pay. The FBI's 2024 IC3 report logged $2.77 billion in business email compromise losses, and the average BEC wire request was about $50,000 — large enough to hurt, small enough to clear a one-person finance department's approval.

What are the most common social-engineering tactics targeting SMBs in 2026?

The mix at small businesses is dominated by phishing email, business email compromise (especially vendor email compromise where a real supplier's mailbox is hijacked), pretext phone calls to the help desk or finance team, smishing texts impersonating shipping or payroll providers, and increasingly QR-code phishing ('quishing') in invoices and parking tickets. Newer trends layer AI on top: deepfake voice clones of an owner asking for an urgent wire, video-call deepfakes during M&A or vendor onboarding, and LLM-personalized spear-phishing that references a real client, contract, or invoice number scraped from a leaked mailbox.

What's the single most effective control a small business can put in place?

An out-of-band callback procedure for every payment change. Before any wire transfer, ACH detail change, or vendor banking update is processed, the request must be confirmed by phone using a number from a previously verified contact list — not a number in the requesting email. This single control would have prevented the majority of the BEC losses the FBI tracked last year. Pair it with phishing-resistant MFA (passkeys/FIDO2) on email and finance systems, and you have eliminated the two attack paths that cause most SMB breaches. Neither requires enterprise software; both can be put in writing this week.

Join our free newsletter to stay ahead of the scammers

Receive updates on monthly scam trends, along with best practices to protect yourself and those you care about.