{"id":2138,"date":"2024-06-14T04:58:21","date_gmt":"2024-06-14T09:58:21","guid":{"rendered":"https:\/\/tncomputermedics.com\/?p=2138"},"modified":"2024-06-14T04:58:23","modified_gmt":"2024-06-14T09:58:23","slug":"what-is-social-engineering-types-examples-and-attacks","status":"publish","type":"post","link":"https:\/\/tncomputermedics.com\/what-is-social-engineering-types-examples-and-attacks\/","title":{"rendered":"What is Social Engineering? (Types, Examples, and Attacks)"},"content":{"rendered":"\n<p>In the realm of cybersecurity, one of the most insidious threats is social engineering. Unlike traditional cyber attacks that rely on technical vulnerabilities, social engineering exploits human psychology to gain unauthorized access to systems and sensitive information. Understanding social engineering, its types, and real-world examples can help you recognize and defend against these deceptive tactics.<\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-what-is-social-engineering\"><strong>What is Social Engineering?<\/strong><\/h3>\n\n\n\n<p>Social engineering is a manipulation technique that exploits human error to gain private information, access, or valuables. The attacker tricks an individual into divulging confidential information or performing actions that compromise security.<\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-types-of-social-engineering-attacks\"><strong>Types of Social Engineering Attacks<\/strong><\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Phishing<\/strong>\n<ul class=\"wp-block-list\">\n<li>Phishing is the most common form of social engineering. Attackers send fraudulent emails or messages posing as legitimate entities to trick recipients into providing sensitive information or downloading malicious attachments.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Spear Phishing<\/strong>\n<ul class=\"wp-block-list\">\n<li>Spear phishing is a targeted form of phishing where attackers tailor their messages to specific individuals or organizations, often using personal information to appear more convincing.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Pretexting<\/strong>\n<ul class=\"wp-block-list\">\n<li>In pretexting, the attacker creates a fabricated scenario, or pretext, to obtain private information. This might involve impersonating a colleague, authority figure, or service provider.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Baiting<\/strong>\n<ul class=\"wp-block-list\">\n<li>Baiting involves enticing victims with a promise of a reward. For example, attackers might leave malware-infected USB drives in public places, hoping someone will pick one up and use it.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Quid Pro Quo<\/strong>\n<ul class=\"wp-block-list\">\n<li>This technique involves promising a benefit in exchange for information or access. An attacker might pretend to be IT support offering help in exchange for login credentials.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Tailgating<\/strong>\n<ul class=\"wp-block-list\">\n<li>Tailgating, or &#8220;piggybacking,&#8221; involves an unauthorized person following an authorized person into a restricted area. This often occurs in physical environments like offices or secure buildings.<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-examples-of-social-engineering-attacks\"><strong>Examples of Social Engineering Attacks<\/strong><\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong><a href=\"https:\/\/tncomputermedics.com\/tips-for-identifying-phishing-emails\/\">Phishing Email<\/a> Example<\/strong>\n<ul class=\"wp-block-list\">\n<li>An email purportedly from a bank asks the recipient to verify their account information due to suspicious activity. The provided link leads to a fake website designed to steal login credentials.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Spear Phishing Example<\/strong>\n<ul class=\"wp-block-list\">\n<li>A high-ranking executive receives an email from what appears to be a trusted partner, requesting urgent transfer of funds. The email contains personal details to make it look authentic, but it&#8217;s a scam.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Pretexting Example<\/strong>\n<ul class=\"wp-block-list\">\n<li>An attacker calls an employee, claiming to be from the IT department, and requests the employee\u2019s login credentials to fix a supposed issue.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Baiting Example<\/strong>\n<ul class=\"wp-block-list\">\n<li>USB drives labeled &#8220;Confidential&#8221; are left in a company&#8217;s parking lot. When curious employees plug them into their computers, malware is installed.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Quid Pro Quo Example<\/strong>\n<ul class=\"wp-block-list\">\n<li>An attacker calls random numbers within an organization, offering free software upgrades in exchange for login details.<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-defending-against-social-engineering-attacks\"><strong>Defending Against Social Engineering Attacks<\/strong><\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Education and Training<\/strong>\n<ul class=\"wp-block-list\">\n<li>Regularly educate employees about social engineering tactics and how to recognize them. Training should include simulated phishing exercises.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Verify Requests<\/strong>\n<ul class=\"wp-block-list\">\n<li>Always verify the identity of the person requesting sensitive information. Use official channels to confirm the legitimacy of the request.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Use <a href=\"https:\/\/tncomputermedics.com\/utilizing-multi-factor-authentication-for-enhanced-data-security\/\">Multi-Factor Authentication<\/a> (MFA)<\/strong>\n<ul class=\"wp-block-list\">\n<li>Implement MFA to add an extra layer of security, making it harder for attackers to gain access with stolen credentials.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Limit Information Sharing<\/strong>\n<ul class=\"wp-block-list\">\n<li>Be cautious about the information shared on social media and professional networks, as attackers often use this information for spear phishing.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Incident Response Plan<\/strong>\n<ul class=\"wp-block-list\">\n<li>Have a clear incident response plan in place to quickly address and mitigate the effects of a social engineering attack.<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n\n\n\n<p>Protecting yourself and your organization from social engineering attacks is crucial in today\u2019s digital landscape. At <strong>TN <a href=\"https:\/\/tncomputermedics.com\/\">Computer Medics<\/a><\/strong>, we specialize in comprehensive cybersecurity solutions to safeguard your information and systems. Contact us today for personalized advice and robust protection against social engineering threats.<\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<script type=\"text\/javascript\">var gform;gform||(document.addEventListener(\"gform_main_scripts_loaded\",function(){gform.scriptsLoaded=!0}),window.addEventListener(\"DOMContentLoaded\",function(){gform.domLoaded=!0}),gform={domLoaded:!1,scriptsLoaded:!1,initializeOnLoaded:function(o){gform.domLoaded&&gform.scriptsLoaded?o():!gform.domLoaded&&gform.scriptsLoaded?window.addEventListener(\"DOMContentLoaded\",o):document.addEventListener(\"gform_main_scripts_loaded\",o)},hooks:{action:{},filter:{}},addAction:function(o,n,r,t){gform.addHook(\"action\",o,n,r,t)},addFilter:function(o,n,r,t){gform.addHook(\"filter\",o,n,r,t)},doAction:function(o){gform.doHook(\"action\",o,arguments)},applyFilters:function(o){return gform.doHook(\"filter\",o,arguments)},removeAction:function(o,n){gform.removeHook(\"action\",o,n)},removeFilter:function(o,n,r){gform.removeHook(\"filter\",o,n,r)},addHook:function(o,n,r,t,i){null==gform.hooks[o][n]&&(gform.hooks[o][n]=[]);var e=gform.hooks[o][n];null==i&&(i=n+\"_\"+e.length),gform.hooks[o][n].push({tag:i,callable:r,priority:t=null==t?10:t})},doHook:function(n,o,r){var t;if(r=Array.prototype.slice.call(r,1),null!=gform.hooks[n][o]&&((o=gform.hooks[n][o]).sort(function(o,n){return o.priority-n.priority}),o.forEach(function(o){\"function\"!=typeof(t=o.callable)&&(t=window[t]),\"action\"==n?t.apply(null,r):r[0]=t.apply(null,r)})),\"filter\"==n)return r[0]},removeHook:function(o,n,t,i){var r;null!=gform.hooks[o][n]&&(r=(r=gform.hooks[o][n]).filter(function(o,n,r){return!!(null!=i&&i!=o.tag||null!=t&&t!=o.priority)}),gform.hooks[o][n]=r)}});<\/script>\n                <div class='gf_browser_unknown gform_wrapper gform-theme gform-theme--foundation gform-theme--framework gform-theme--orbital' data-form-theme='orbital' data-form-index='0' id='gform_wrapper_1' ><style>#gform_wrapper_1[data-form-index=\"0\"].gform-theme,[data-parent-form=\"1_0\"]{--gf-color-primary: #204ce5;--gf-color-primary-rgb: 32, 76, 229;--gf-color-primary-contrast: #fff;--gf-color-primary-contrast-rgb: 255, 255, 255;--gf-color-primary-darker: #001AB3;--gf-color-primary-lighter: #527EFF;--gf-color-secondary: #fff;--gf-color-secondary-rgb: 255, 255, 255;--gf-color-secondary-contrast: #112337;--gf-color-secondary-contrast-rgb: 17, 35, 55;--gf-color-secondary-darker: #F5F5F5;--gf-color-secondary-lighter: #FFFFFF;--gf-color-out-ctrl-light: rgba(17, 35, 55, 0.1);--gf-color-out-ctrl-light-rgb: 17, 35, 55;--gf-color-out-ctrl-light-darker: rgba(104, 110, 119, 0.35);--gf-color-out-ctrl-light-lighter: #F5F5F5;--gf-color-out-ctrl-dark: #585e6a;--gf-color-out-ctrl-dark-rgb: 88, 94, 106;--gf-color-out-ctrl-dark-darker: #112337;--gf-color-out-ctrl-dark-lighter: rgba(17, 35, 55, 0.65);--gf-color-in-ctrl: #fff;--gf-color-in-ctrl-rgb: 255, 255, 255;--gf-color-in-ctrl-contrast: #112337;--gf-color-in-ctrl-contrast-rgb: 17, 35, 55;--gf-color-in-ctrl-darker: #F5F5F5;--gf-color-in-ctrl-lighter: #FFFFFF;--gf-color-in-ctrl-primary: #204ce5;--gf-color-in-ctrl-primary-rgb: 32, 76, 229;--gf-color-in-ctrl-primary-contrast: #fff;--gf-color-in-ctrl-primary-contrast-rgb: 255, 255, 255;--gf-color-in-ctrl-primary-darker: #001AB3;--gf-color-in-ctrl-primary-lighter: #527EFF;--gf-color-in-ctrl-light: rgba(17, 35, 55, 0.1);--gf-color-in-ctrl-light-rgb: 17, 35, 55;--gf-color-in-ctrl-light-darker: rgba(104, 110, 119, 0.35);--gf-color-in-ctrl-light-lighter: #F5F5F5;--gf-color-in-ctrl-dark: #585e6a;--gf-color-in-ctrl-dark-rgb: 88, 94, 106;--gf-color-in-ctrl-dark-darker: #112337;--gf-color-in-ctrl-dark-lighter: rgba(17, 35, 55, 0.65);--gf-radius: 3px;--gf-font-size-secondary: 14px;--gf-font-size-tertiary: 13px;--gf-icon-ctrl-number: url(\"data:image\/svg+xml,%3Csvg width='8' height='14' viewBox='0 0 8 14' fill='none' xmlns='http:\/\/www.w3.org\/2000\/svg'%3E%3Cpath fill-rule='evenodd' clip-rule='evenodd' d='M4 0C4.26522 5.96046e-08 4.51957 0.105357 4.70711 0.292893L7.70711 3.29289C8.09763 3.68342 8.09763 4.31658 7.70711 4.70711C7.31658 5.09763 6.68342 5.09763 6.29289 4.70711L4 2.41421L1.70711 4.70711C1.31658 5.09763 0.683417 5.09763 0.292893 4.70711C-0.0976311 4.31658 -0.097631 3.68342 0.292893 3.29289L3.29289 0.292893C3.48043 0.105357 3.73478 0 4 0ZM0.292893 9.29289C0.683417 8.90237 1.31658 8.90237 1.70711 9.29289L4 11.5858L6.29289 9.29289C6.68342 8.90237 7.31658 8.90237 7.70711 9.29289C8.09763 9.68342 8.09763 10.3166 7.70711 10.7071L4.70711 13.7071C4.31658 14.0976 3.68342 14.0976 3.29289 13.7071L0.292893 10.7071C-0.0976311 10.3166 -0.0976311 9.68342 0.292893 9.29289Z' fill='rgba(17, 35, 55, 0.65)'\/%3E%3C\/svg%3E\");--gf-icon-ctrl-select: url(\"data:image\/svg+xml,%3Csvg width='10' height='6' viewBox='0 0 10 6' fill='none' xmlns='http:\/\/www.w3.org\/2000\/svg'%3E%3Cpath fill-rule='evenodd' clip-rule='evenodd' d='M0.292893 0.292893C0.683417 -0.097631 1.31658 -0.097631 1.70711 0.292893L5 3.58579L8.29289 0.292893C8.68342 -0.0976311 9.31658 -0.0976311 9.70711 0.292893C10.0976 0.683417 10.0976 1.31658 9.70711 1.70711L5.70711 5.70711C5.31658 6.09763 4.68342 6.09763 4.29289 5.70711L0.292893 1.70711C-0.0976311 1.31658 -0.0976311 0.683418 0.292893 0.292893Z' fill='rgba(17, 35, 55, 0.65)'\/%3E%3C\/svg%3E\");--gf-icon-ctrl-search: url(\"data:image\/svg+xml,%3Csvg version='1.1' xmlns='http:\/\/www.w3.org\/2000\/svg' width='640' height='640'%3E%3Cpath d='M256 128c-70.692 0-128 57.308-128 128 0 70.691 57.308 128 128 128 70.691 0 128-57.309 128-128 0-70.692-57.309-128-128-128zM64 256c0-106.039 85.961-192 192-192s192 85.961 192 192c0 41.466-13.146 79.863-35.498 111.248l154.125 154.125c12.496 12.496 12.496 32.758 0 45.254s-32.758 12.496-45.254 0L367.248 412.502C335.862 434.854 297.467 448 256 448c-106.039 0-192-85.962-192-192z' fill='rgba(17, 35, 55, 0.65)'\/%3E%3C\/svg%3E\");--gf-label-space-y-secondary: var(--gf-label-space-y-md-secondary);--gf-ctrl-border-color: #686e77;--gf-ctrl-size: var(--gf-ctrl-size-md);--gf-ctrl-label-color-primary: #112337;--gf-ctrl-label-color-secondary: #112337;--gf-ctrl-choice-size: var(--gf-ctrl-choice-size-md);--gf-ctrl-checkbox-check-size: var(--gf-ctrl-checkbox-check-size-md);--gf-ctrl-radio-check-size: var(--gf-ctrl-radio-check-size-md);--gf-ctrl-btn-font-size: var(--gf-ctrl-btn-font-size-md);--gf-ctrl-btn-padding-x: var(--gf-ctrl-btn-padding-x-md);--gf-ctrl-btn-size: var(--gf-ctrl-btn-size-md);--gf-ctrl-btn-border-color-secondary: #686e77;--gf-ctrl-file-btn-bg-color-hover: #EBEBEB;--gf-field-pg-steps-number-color: rgba(17, 35, 55, 0.8);}<\/style>\n                        <div class='gform_heading'>\n                            <h2 class=\"gform_title\">Contact Us<\/h2>\n                            <p class='gform_description'><\/p>\n                        <\/div><form method='post' enctype='multipart\/form-data'  id='gform_1'  action='\/wp-json\/wp\/v2\/posts\/2138' data-formid='1' novalidate>\n                        <div class='gform-body gform_body'><div id='gform_fields_1' class='gform_fields top_label form_sublabel_above description_above'><div id=\"field_1_6\" class=\"gfield gfield--type-text gfield--width-half gfield_contains_required field_sublabel_above gfield--no-description field_description_above gfield_visibility_visible\"  data-js-reload=\"field_1_6\" ><label class='gfield_label gform-field-label' for='input_1_6'>Name<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_text\">(Required)<\/span><\/span><\/label><div class='ginput_container ginput_container_text'><input name='input_6' id='input_1_6' type='text' value='' class='large'     aria-required=\"true\" aria-invalid=\"false\"   \/> <\/div><\/div><div id=\"field_1_2\" class=\"gfield gfield--type-email gfield--width-half gfield_contains_required field_sublabel_above gfield--no-description field_description_above gfield_visibility_visible\"  data-js-reload=\"field_1_2\" ><label class='gfield_label gform-field-label' for='input_1_2'>Email<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_text\">(Required)<\/span><\/span><\/label><div class='ginput_container ginput_container_email'>\n                            <input name='input_2' id='input_1_2' type='email' value='' class='large'    aria-required=\"true\" aria-invalid=\"false\"  \/>\n                        <\/div><\/div><div id=\"field_1_4\" class=\"gfield gfield--type-phone gfield--width-half gfield_contains_required field_sublabel_above gfield--no-description field_description_above gfield_visibility_visible\"  data-js-reload=\"field_1_4\" ><label class='gfield_label gform-field-label' for='input_1_4'>Phone<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_text\">(Required)<\/span><\/span><\/label><div class='ginput_container ginput_container_phone'><input name='input_4' id='input_1_4' type='tel' value='' class='large'   aria-required=\"true\" aria-invalid=\"false\"   \/><\/div><\/div><div id=\"field_1_5\" class=\"gfield gfield--type-text gfield--width-half gfield_contains_required field_sublabel_above gfield--no-description field_description_above gfield_visibility_visible\"  data-js-reload=\"field_1_5\" ><label class='gfield_label gform-field-label' for='input_1_5'>Subject<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_text\">(Required)<\/span><\/span><\/label><div class='ginput_container ginput_container_text'><input name='input_5' id='input_1_5' type='text' value='' class='large'     aria-required=\"true\" aria-invalid=\"false\"   \/> <\/div><\/div><div id=\"field_1_3\" class=\"gfield gfield--type-textarea gfield_contains_required field_sublabel_above gfield--has-description field_description_above gfield_visibility_visible\"  data-js-reload=\"field_1_3\" ><label class='gfield_label gform-field-label' for='input_1_3'>Message<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_text\">(Required)<\/span><\/span><\/label><div class='gfield_description' id='gfield_description_1_3'>Please let us know what&#039;s on your mind. Have a question for us? Ask away.<\/div><div class='ginput_container ginput_container_textarea'><textarea name='input_3' id='input_1_3' class='textarea medium'  aria-describedby=\"gfield_description_1_3\" maxlength='600'  aria-required=\"true\" aria-invalid=\"false\"   rows='10' cols='50'><\/textarea><\/div><\/div><div id=\"field_1_7\" class=\"gfield gfield--type-captcha gfield--width-full field_sublabel_above gfield--no-description field_description_above gfield_visibility_visible\"  data-js-reload=\"field_1_7\" ><label class='gfield_label gform-field-label' for='input_1_7'>Captcha<\/label><div id='input_1_7' class='ginput_container ginput_recaptcha' data-sitekey='6LcK0kkpAAAAALn3ZtVowbVf-WTN_wrfEruA2NEk'  data-theme='light' data-tabindex='0'  data-badge=''><\/div><\/div><\/div><\/div>\n        <div class='gform_footer top_label'> <input type='submit' id='gform_submit_button_1' class='gform_button button' value='SEND A MESSAGE'  onclick='if(window[\"gf_submitting_1\"]){return false;}  if( !jQuery(\"#gform_1\")[0].checkValidity || jQuery(\"#gform_1\")[0].checkValidity()){window[\"gf_submitting_1\"]=true;}  ' onkeypress='if( event.keyCode == 13 ){ if(window[\"gf_submitting_1\"]){return false;} if( !jQuery(\"#gform_1\")[0].checkValidity || jQuery(\"#gform_1\")[0].checkValidity()){window[\"gf_submitting_1\"]=true;}  jQuery(\"#gform_1\").trigger(\"submit\",[true]); }' \/> \n            <input type='hidden' class='gform_hidden' name='is_submit_1' value='1' \/>\n            <input type='hidden' class='gform_hidden' name='gform_submit' value='1' \/>\n            \n            <input type='hidden' class='gform_hidden' name='gform_unique_id' value='' \/>\n            <input type='hidden' class='gform_hidden' name='state_1' value='WyJbXSIsIjliMzQ4MGIxOTMwYWU0ZWIxYmE0ZWZhZmMxY2QwZjY4Il0=' \/>\n            <input type='hidden' class='gform_hidden' name='gform_target_page_number_1' id='gform_target_page_number_1' value='0' \/>\n            <input type='hidden' class='gform_hidden' name='gform_source_page_number_1' id='gform_source_page_number_1' value='1' \/>\n            <input type='hidden' name='gform_field_values' value='' \/>\n            \n        <\/div>\n                        <input type=\"hidden\" id=\"ct_checkjs_2a9d121cd9c3a1832bb6d2cc6bd7a8a7\" name=\"ct_checkjs\" value=\"0\" \/><script >setTimeout(function(){var ct_input_name = \"ct_checkjs_2a9d121cd9c3a1832bb6d2cc6bd7a8a7\";if (document.getElementById(ct_input_name) !== null) {var ct_input_value = document.getElementById(ct_input_name).value;document.getElementById(ct_input_name).value = document.getElementById(ct_input_name).value.replace(ct_input_value, '0d023493218022e1f4933d62fc7ec74ec0c7f922f4664bcc4f311231d3ce5100');}}, 1000);<\/script><label class=\"apbct_special_field\" id=\"apbct_label_id36931\" for=\"apbct__email_id__gravity_form_36931\">36931<\/label><input \n        id=\"apbct__email_id__gravity_form_36931\" \n        class=\"apbct_special_field apbct__email_id__gravity_form\"\n        autocomplete=\"off\" \n        name=\"apbct__email_id__gravity_form_36931\"  \n        type=\"text\" \n        value=\"36931\" \n        size=\"30\" \n        apbct_event_id=\"36931\"\n        maxlength=\"200\" \n    \/><input \n        id=\"apbct_event_id_gravity_form_36931\"\n        class=\"apbct_special_field\"\n        name=\"apbct_event_id\"\n        type=\"hidden\" \n        value=\"36931\" \n            \/><\/form>\n                        <\/div><script>\ngform.initializeOnLoaded( function() {gformInitSpinner( 1, 'https:\/\/tncomputermedics.com\/wp-content\/plugins\/gravityforms\/images\/spinner.svg', false );jQuery('#gform_ajax_frame_1').on('load',function(){var contents = jQuery(this).contents().find('*').html();var is_postback = contents.indexOf('GF_AJAX_POSTBACK') >= 0;if(!is_postback){return;}var form_content = jQuery(this).contents().find('#gform_wrapper_1');var is_confirmation = jQuery(this).contents().find('#gform_confirmation_wrapper_1').length > 0;var is_redirect = contents.indexOf('gformRedirect(){') >= 0;var is_form = form_content.length > 0 && ! is_redirect && ! is_confirmation;var mt = parseInt(jQuery('html').css('margin-top'), 10) + parseInt(jQuery('body').css('margin-top'), 10) + 100;if(is_form){jQuery('#gform_wrapper_1').html(form_content.html());if(form_content.hasClass('gform_validation_error')){jQuery('#gform_wrapper_1').addClass('gform_validation_error');} else {jQuery('#gform_wrapper_1').removeClass('gform_validation_error');}setTimeout( function() { \/* delay the scroll by 50 milliseconds to fix a bug in chrome *\/  }, 50 );if(window['gformInitDatepicker']) {gformInitDatepicker();}if(window['gformInitPriceFields']) {gformInitPriceFields();}var current_page = jQuery('#gform_source_page_number_1').val();gformInitSpinner( 1, 'https:\/\/tncomputermedics.com\/wp-content\/plugins\/gravityforms\/images\/spinner.svg', false );jQuery(document).trigger('gform_page_loaded', [1, current_page]);window['gf_submitting_1'] = false;}else if(!is_redirect){var confirmation_content = jQuery(this).contents().find('.GF_AJAX_POSTBACK').html();if(!confirmation_content){confirmation_content = contents;}setTimeout(function(){jQuery('#gform_wrapper_1').replaceWith(confirmation_content);jQuery(document).trigger('gform_confirmation_loaded', [1]);window['gf_submitting_1'] = false;wp.a11y.speak(jQuery('#gform_confirmation_message_1').text());}, 50);}else{jQuery('#gform_1').append(contents);if(window['gformRedirect']) {gformRedirect();}}jQuery(document).trigger('gform_post_render', [1, current_page]);gform.utils.trigger({ event: 'gform\/postRender', native: false, data: { formId: 1, currentPage: current_page } });} );} );\n<\/script>\n","protected":false},"excerpt":{"rendered":"<p>In the realm of cybersecurity, one of the most insidious threats is social engineering. Unlike traditional cyber attacks that rely on technical vulnerabilities, social engineering exploits human psychology to gain unauthorized access to systems and sensitive information. Understanding social engineering, its types, and real-world examples can help you recognize and defend against these deceptive tactics. What is Social Engineering? Social engineering is a manipulation technique that exploits human error to[&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2141,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[85],"tags":[],"class_list":["post-2138","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-insights"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v21.7 (Yoast SEO v23.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Social Engineering? (Types, Examples, and Attacks) - Expert in Cyber Security and Computer Repair Services<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/tncomputermedics.com\/what-is-social-engineering-types-examples-and-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Social Engineering? (Types, Examples, and Attacks)\" \/>\n<meta property=\"og:description\" content=\"In the realm of cybersecurity, one of the most insidious threats is social engineering. Unlike traditional cyber attacks that rely on technical vulnerabilities, social engineering exploits human psychology to gain unauthorized access to systems and sensitive information. Understanding social engineering, its types, and real-world examples can help you recognize and defend against these deceptive tactics. What is Social Engineering? Social engineering is a manipulation technique that exploits human error to[&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tncomputermedics.com\/what-is-social-engineering-types-examples-and-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Expert in Cyber Security and Computer Repair Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/tncomputermedics\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-14T09:58:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-14T09:58:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tncomputermedics.com\/wp-content\/uploads\/2024\/06\/What-is-Social-Engineering-Types-Examples-and-Attacks.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"787\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"tncm\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TNComputerMedic\" \/>\n<meta name=\"twitter:site\" content=\"@TNComputerMedic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tncm\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/tncomputermedics.com\/what-is-social-engineering-types-examples-and-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/tncomputermedics.com\/what-is-social-engineering-types-examples-and-attacks\/\"},\"author\":{\"name\":\"tncm\",\"@id\":\"https:\/\/tncomputermedics.com\/#\/schema\/person\/c8c029d25ece0f7bb0bc470c97f158a9\"},\"headline\":\"What is Social Engineering? (Types, Examples, and Attacks)\",\"datePublished\":\"2024-06-14T09:58:21+00:00\",\"dateModified\":\"2024-06-14T09:58:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/tncomputermedics.com\/what-is-social-engineering-types-examples-and-attacks\/\"},\"wordCount\":589,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/tncomputermedics.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/tncomputermedics.com\/what-is-social-engineering-types-examples-and-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tncomputermedics.com\/wp-content\/uploads\/2024\/06\/What-is-Social-Engineering-Types-Examples-and-Attacks.jpg\",\"articleSection\":[\"Cybersecurity Insights\"],\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/tncomputermedics.com\/what-is-social-engineering-types-examples-and-attacks\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tncomputermedics.com\/what-is-social-engineering-types-examples-and-attacks\/\",\"url\":\"https:\/\/tncomputermedics.com\/what-is-social-engineering-types-examples-and-attacks\/\",\"name\":\"What is Social Engineering? (Types, Examples, and Attacks) - Expert in Cyber Security and Computer Repair Services\",\"isPartOf\":{\"@id\":\"https:\/\/tncomputermedics.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tncomputermedics.com\/what-is-social-engineering-types-examples-and-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tncomputermedics.com\/what-is-social-engineering-types-examples-and-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tncomputermedics.com\/wp-content\/uploads\/2024\/06\/What-is-Social-Engineering-Types-Examples-and-Attacks.jpg\",\"datePublished\":\"2024-06-14T09:58:21+00:00\",\"dateModified\":\"2024-06-14T09:58:23+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/tncomputermedics.com\/what-is-social-engineering-types-examples-and-attacks\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tncomputermedics.com\/what-is-social-engineering-types-examples-and-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/tncomputermedics.com\/what-is-social-engineering-types-examples-and-attacks\/#primaryimage\",\"url\":\"https:\/\/tncomputermedics.com\/wp-content\/uploads\/2024\/06\/What-is-Social-Engineering-Types-Examples-and-Attacks.jpg\",\"contentUrl\":\"https:\/\/tncomputermedics.com\/wp-content\/uploads\/2024\/06\/What-is-Social-Engineering-Types-Examples-and-Attacks.jpg\",\"width\":1400,\"height\":787,\"caption\":\"What is Social Engineering? Types, Examples, and Attacks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tncomputermedics.com\/what-is-social-engineering-types-examples-and-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tncomputermedics.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Social Engineering? (Types, Examples, and Attacks)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tncomputermedics.com\/#website\",\"url\":\"https:\/\/tncomputermedics.com\/\",\"name\":\"Expert in Cyber Security and Computer Repair Services\",\"description\":\"TN Computer Medics\",\"publisher\":{\"@id\":\"https:\/\/tncomputermedics.com\/#organization\"},\"alternateName\":\"TN Computer Medics\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tncomputermedics.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en\"},{\"@type\":[\"Organization\",\"Place\",\"ProfessionalService\"],\"@id\":\"https:\/\/tncomputermedics.com\/#organization\",\"name\":\"TN Computer Medics\",\"alternateName\":\"Expert in Cyber Security and Computer Repair Services\",\"url\":\"https:\/\/tncomputermedics.com\/\",\"logo\":{\"@id\":\"https:\/\/tncomputermedics.com\/what-is-social-engineering-types-examples-and-attacks\/#local-main-organization-logo\"},\"image\":{\"@id\":\"https:\/\/tncomputermedics.com\/what-is-social-engineering-types-examples-and-attacks\/#local-main-organization-logo\"},\"sameAs\":[\"https:\/\/www.facebook.com\/tncomputermedics\",\"https:\/\/x.com\/TNComputerMedic\",\"https:\/\/www.pinterest.com\/tncomputermedics\/\",\"https:\/\/twitter.com\/TNComputerMedic\",\"https:\/\/www.linkedin.com\/company\/tncomputermedics\/\",\"https:\/\/www.youtube.com\/@TNComputerMedics\",\"https:\/\/www.instagram.com\/tncomputermedic\/\"],\"address\":{\"@id\":\"https:\/\/tncomputermedics.com\/what-is-social-engineering-types-examples-and-attacks\/#local-main-place-address\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"35.813080\",\"longitude\":\"-86.368850\"},\"telephone\":[\"(615) 806-1535\"],\"openingHoursSpecification\":[{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Monday\",\"Tuesday\",\"Wednesday\",\"Thursday\",\"Friday\"],\"opens\":\"08:00\",\"closes\":\"18:30\"},{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Saturday\"],\"opens\":\"10:00\",\"closes\":\"16:00\"},{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Sunday\"],\"opens\":\"11:00\",\"closes\":\"16:00\"}],\"email\":\"hello@tncomputermedics.com\",\"areaServed\":\"Murfreesboro, Nashville, Brentwood, Berry Hill, Franklin, Mount Juliet, Hermitage, Chattanooga, Tullahoma\",\"priceRange\":\"$$\",\"paymentAccepted\":\"American Express, Mastercard, Visa\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/tncomputermedics.com\/#\/schema\/person\/c8c029d25ece0f7bb0bc470c97f158a9\",\"name\":\"tncm\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/tncomputermedics.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/69459e0fd6239a36b405b7ba7e1d3036?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/69459e0fd6239a36b405b7ba7e1d3036?s=96&d=mm&r=g\",\"caption\":\"tncm\"},\"sameAs\":[\"https:\/\/tncomputermedics.com\"],\"url\":\"https:\/\/tncomputermedics.com\/author\/e4572b8864bd281d\/\"},{\"@type\":\"PostalAddress\",\"@id\":\"https:\/\/tncomputermedics.com\/what-is-social-engineering-types-examples-and-attacks\/#local-main-place-address\",\"streetAddress\":\"1715 -K South Rutherford Blvd\",\"addressLocality\":\"Murfreesboro\",\"postalCode\":\"37130\",\"addressRegion\":\"Tennessee\",\"addressCountry\":\"US\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/tncomputermedics.com\/what-is-social-engineering-types-examples-and-attacks\/#local-main-organization-logo\",\"url\":\"https:\/\/tncomputermedics.com\/wp-content\/uploads\/2024\/01\/logo.png\",\"contentUrl\":\"https:\/\/tncomputermedics.com\/wp-content\/uploads\/2024\/01\/logo.png\",\"width\":300,\"height\":110,\"caption\":\"TN Computer Medics\"}]}<\/script>\n<meta name=\"geo.placename\" content=\"Murfreesboro\" \/>\n<meta name=\"geo.position\" content=\"35.813080;-86.368850\" \/>\n<meta name=\"geo.region\" content=\"United States (US)\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What is Social Engineering? (Types, Examples, and Attacks) - Expert in Cyber Security and Computer Repair Services","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/tncomputermedics.com\/what-is-social-engineering-types-examples-and-attacks\/","og_locale":"en_US","og_type":"article","og_title":"What is Social Engineering? (Types, Examples, and Attacks)","og_description":"In the realm of cybersecurity, one of the most insidious threats is social engineering. Unlike traditional cyber attacks that rely on technical vulnerabilities, social engineering exploits human psychology to gain unauthorized access to systems and sensitive information. Understanding social engineering, its types, and real-world examples can help you recognize and defend against these deceptive tactics. What is Social Engineering? Social engineering is a manipulation technique that exploits human error to[&hellip;]","og_url":"https:\/\/tncomputermedics.com\/what-is-social-engineering-types-examples-and-attacks\/","og_site_name":"Expert in Cyber Security and Computer Repair Services","article_publisher":"https:\/\/www.facebook.com\/tncomputermedics","article_published_time":"2024-06-14T09:58:21+00:00","article_modified_time":"2024-06-14T09:58:23+00:00","og_image":[{"width":1400,"height":787,"url":"https:\/\/tncomputermedics.com\/wp-content\/uploads\/2024\/06\/What-is-Social-Engineering-Types-Examples-and-Attacks.jpg","type":"image\/jpeg"}],"author":"tncm","twitter_card":"summary_large_image","twitter_creator":"@TNComputerMedic","twitter_site":"@TNComputerMedic","twitter_misc":{"Written by":"tncm","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/tncomputermedics.com\/what-is-social-engineering-types-examples-and-attacks\/#article","isPartOf":{"@id":"https:\/\/tncomputermedics.com\/what-is-social-engineering-types-examples-and-attacks\/"},"author":{"name":"tncm","@id":"https:\/\/tncomputermedics.com\/#\/schema\/person\/c8c029d25ece0f7bb0bc470c97f158a9"},"headline":"What is Social Engineering? (Types, Examples, and Attacks)","datePublished":"2024-06-14T09:58:21+00:00","dateModified":"2024-06-14T09:58:23+00:00","mainEntityOfPage":{"@id":"https:\/\/tncomputermedics.com\/what-is-social-engineering-types-examples-and-attacks\/"},"wordCount":589,"commentCount":0,"publisher":{"@id":"https:\/\/tncomputermedics.com\/#organization"},"image":{"@id":"https:\/\/tncomputermedics.com\/what-is-social-engineering-types-examples-and-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/tncomputermedics.com\/wp-content\/uploads\/2024\/06\/What-is-Social-Engineering-Types-Examples-and-Attacks.jpg","articleSection":["Cybersecurity Insights"],"inLanguage":"en","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/tncomputermedics.com\/what-is-social-engineering-types-examples-and-attacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/tncomputermedics.com\/what-is-social-engineering-types-examples-and-attacks\/","url":"https:\/\/tncomputermedics.com\/what-is-social-engineering-types-examples-and-attacks\/","name":"What is Social Engineering? (Types, Examples, and Attacks) - Expert in Cyber Security and Computer Repair Services","isPartOf":{"@id":"https:\/\/tncomputermedics.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tncomputermedics.com\/what-is-social-engineering-types-examples-and-attacks\/#primaryimage"},"image":{"@id":"https:\/\/tncomputermedics.com\/what-is-social-engineering-types-examples-and-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/tncomputermedics.com\/wp-content\/uploads\/2024\/06\/What-is-Social-Engineering-Types-Examples-and-Attacks.jpg","datePublished":"2024-06-14T09:58:21+00:00","dateModified":"2024-06-14T09:58:23+00:00","breadcrumb":{"@id":"https:\/\/tncomputermedics.com\/what-is-social-engineering-types-examples-and-attacks\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tncomputermedics.com\/what-is-social-engineering-types-examples-and-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/tncomputermedics.com\/what-is-social-engineering-types-examples-and-attacks\/#primaryimage","url":"https:\/\/tncomputermedics.com\/wp-content\/uploads\/2024\/06\/What-is-Social-Engineering-Types-Examples-and-Attacks.jpg","contentUrl":"https:\/\/tncomputermedics.com\/wp-content\/uploads\/2024\/06\/What-is-Social-Engineering-Types-Examples-and-Attacks.jpg","width":1400,"height":787,"caption":"What is Social Engineering? Types, Examples, and Attacks"},{"@type":"BreadcrumbList","@id":"https:\/\/tncomputermedics.com\/what-is-social-engineering-types-examples-and-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tncomputermedics.com\/"},{"@type":"ListItem","position":2,"name":"What is Social Engineering? (Types, Examples, and Attacks)"}]},{"@type":"WebSite","@id":"https:\/\/tncomputermedics.com\/#website","url":"https:\/\/tncomputermedics.com\/","name":"Expert in Cyber Security and Computer Repair Services","description":"TN Computer Medics","publisher":{"@id":"https:\/\/tncomputermedics.com\/#organization"},"alternateName":"TN Computer Medics","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tncomputermedics.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en"},{"@type":["Organization","Place","ProfessionalService"],"@id":"https:\/\/tncomputermedics.com\/#organization","name":"TN Computer Medics","alternateName":"Expert in Cyber Security and Computer Repair Services","url":"https:\/\/tncomputermedics.com\/","logo":{"@id":"https:\/\/tncomputermedics.com\/what-is-social-engineering-types-examples-and-attacks\/#local-main-organization-logo"},"image":{"@id":"https:\/\/tncomputermedics.com\/what-is-social-engineering-types-examples-and-attacks\/#local-main-organization-logo"},"sameAs":["https:\/\/www.facebook.com\/tncomputermedics","https:\/\/x.com\/TNComputerMedic","https:\/\/www.pinterest.com\/tncomputermedics\/","https:\/\/twitter.com\/TNComputerMedic","https:\/\/www.linkedin.com\/company\/tncomputermedics\/","https:\/\/www.youtube.com\/@TNComputerMedics","https:\/\/www.instagram.com\/tncomputermedic\/"],"address":{"@id":"https:\/\/tncomputermedics.com\/what-is-social-engineering-types-examples-and-attacks\/#local-main-place-address"},"geo":{"@type":"GeoCoordinates","latitude":"35.813080","longitude":"-86.368850"},"telephone":["(615) 806-1535"],"openingHoursSpecification":[{"@type":"OpeningHoursSpecification","dayOfWeek":["Monday","Tuesday","Wednesday","Thursday","Friday"],"opens":"08:00","closes":"18:30"},{"@type":"OpeningHoursSpecification","dayOfWeek":["Saturday"],"opens":"10:00","closes":"16:00"},{"@type":"OpeningHoursSpecification","dayOfWeek":["Sunday"],"opens":"11:00","closes":"16:00"}],"email":"hello@tncomputermedics.com","areaServed":"Murfreesboro, Nashville, Brentwood, Berry Hill, Franklin, Mount Juliet, Hermitage, Chattanooga, Tullahoma","priceRange":"$$","paymentAccepted":"American Express, Mastercard, Visa"},{"@type":"Person","@id":"https:\/\/tncomputermedics.com\/#\/schema\/person\/c8c029d25ece0f7bb0bc470c97f158a9","name":"tncm","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/tncomputermedics.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/69459e0fd6239a36b405b7ba7e1d3036?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/69459e0fd6239a36b405b7ba7e1d3036?s=96&d=mm&r=g","caption":"tncm"},"sameAs":["https:\/\/tncomputermedics.com"],"url":"https:\/\/tncomputermedics.com\/author\/e4572b8864bd281d\/"},{"@type":"PostalAddress","@id":"https:\/\/tncomputermedics.com\/what-is-social-engineering-types-examples-and-attacks\/#local-main-place-address","streetAddress":"1715 -K South Rutherford Blvd","addressLocality":"Murfreesboro","postalCode":"37130","addressRegion":"Tennessee","addressCountry":"US"},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/tncomputermedics.com\/what-is-social-engineering-types-examples-and-attacks\/#local-main-organization-logo","url":"https:\/\/tncomputermedics.com\/wp-content\/uploads\/2024\/01\/logo.png","contentUrl":"https:\/\/tncomputermedics.com\/wp-content\/uploads\/2024\/01\/logo.png","width":300,"height":110,"caption":"TN Computer Medics"}]},"geo.placename":"Murfreesboro","geo.position":{"lat":"35.813080","long":"-86.368850"},"geo.region":"United States (US)"},"_links":{"self":[{"href":"https:\/\/tncomputermedics.com\/wp-json\/wp\/v2\/posts\/2138"}],"collection":[{"href":"https:\/\/tncomputermedics.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tncomputermedics.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tncomputermedics.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tncomputermedics.com\/wp-json\/wp\/v2\/comments?post=2138"}],"version-history":[{"count":3,"href":"https:\/\/tncomputermedics.com\/wp-json\/wp\/v2\/posts\/2138\/revisions"}],"predecessor-version":[{"id":2247,"href":"https:\/\/tncomputermedics.com\/wp-json\/wp\/v2\/posts\/2138\/revisions\/2247"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tncomputermedics.com\/wp-json\/wp\/v2\/media\/2141"}],"wp:attachment":[{"href":"https:\/\/tncomputermedics.com\/wp-json\/wp\/v2\/media?parent=2138"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tncomputermedics.com\/wp-json\/wp\/v2\/categories?post=2138"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tncomputermedics.com\/wp-json\/wp\/v2\/tags?post=2138"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}