
Brian Sims
Editor
Brian Sims
Editor
OVER THE past 12 months, several major High Street retailers have reported cyber breaches that actively exploited human targets rather than purely technical flaws, writes Patrick Quirk. This underlines a growing trend: social engineering is fast becoming one of the simplest, cheapest and most effective ways in which attackers are attempting to gain a foothold in corporate networks.
That’s also reflected in CrowdStrike’s 2025 Global Threat Report, which shows a 442% surge in social engineering tactics aimed at stealing credentials in the second half of 2024. This particular escalation shows no sign of easing.
The rising threat comes at a time when many organisations are also grappling with a shrinking pool of skilled network engineers. Many veterans are retiring or moving on, leaving fewer individuals to manage sprawling estates or spot subtle signs of compromise. This talent shortage is critical because social engineering targets human weaknesses far more than technical flaws. Less experienced front line teams may miss sophisticated pretexting or unusual Help Desk requests that should set alarm bells ringing.
Without strong human oversight, attackers can exploit routine password reset processes to gain initial access. Once inside, they can move laterally, deploy ransomware or disrupt critical services long before an automated alert is triggered. The impact is severe. Beyond costly recovery bills running into millions of pounds, businesses risk damage to their reputation, regulatory penalties and downtime that erodes customer trust.
Ultimately, even the most advanced security stack can fail if a clever phone call or e-mail bypasses protocol.
Practical route to resilience
In order to counter rising social engineering threats with smaller engineering teams, organisations need controls that demand less manual effort.
One proven measure is to establish a separate and secure channel for network management. By isolating the management plane from the production network with a smart Out of Band (OOB) network layer, teams gain an independent back-up path that remains live even when the primary network is compromised. This secondary channel lets engineers verify user identities with pre-agreed code words or digital certificates, shutting down fraudsters who rely on password resets.
It also enables faster containment when suspicious activity appears. Rather than tweaking firewall rules over the attacked network, engineers can switch to the OOB link, isolate affected devices and roll back configurations without exposing the core network.
For understaffed teams, these capabilities automate many time-consuming tasks, thereby easing pressure and speeding up response. Automation plays a vital role as well. By linking alerts to threat intelligence feeds, systems can flag potentially risky logins – such as an admin account used from an unusual location – and automatically enforce lockdowns.
These might include disabling network ports temporarily or power-cycling a compromised device. This means that even one engineer handling multiple incidents has a reliable first line of defence, buying time to investigate before the damage can spread.
Built for modern operations
Secure remote management also supports today’s hybrid working patterns. Engineers increasingly troubleshoot from home, branch offices or even the train. Without a hardened, secure and remote OOB connection, they waste time juggling VPNs or risk exposing sensitive interfaces to the Internet.
By contrast, a dedicated network management channel lets them apply patches, back-up configurations or perform an emergency shutdown confidently, no matter where they are.
This efficiency strengthens defences against social engineering and boosts overall resilience. Automation keeps that momentum going. By removing the grunt work of routine firefighting, engineers can concentrate on architecture reviews, tabletop exercises and user training: activities that raise the bar against social engineering.
Integrating secure management with wider security tools enhances protection still further. Linking smart OOB platforms to SIEM systems connects console-level alerts with network-wide telemetry to deliver a single and coherent view of suspicious behaviour, ensuring that even low-traffic ports and legacy hardware stay on the radar. This comprehensive approach means no suspicious activity goes unnoticed, even on rarely accessed ports.
Closing the gap
Pairing an isolated management plane with automation creates a strong cycle of resilience. Engineers benefit from secure processes that block social engineering, while automated safeguards compensate for talent shortages. When phishing campaigns or unexpected credential reset requests arrive, organisations stay in control, swiftly quarantining the affected segment and restoring service without exhausting scarce personnel.
Social engineering attacks will only become more inventive, while the engineering workforce will not replenish itself overnight. Investing in a secure and automated network management channel therefore affords organisations a force multiplier: fewer specialists can look after more equipment without letting the drawbridge down.
Path of least resistance
Putting an encrypted OOB management link in place prevents attackers from accessing configuration switches. For any business whose reputation rests on uptime, the outlay is modest compared with a week of lost trading or the headache of a regulatory inestigation.
Secure remote access, intelligent automation and a clearly segmented control plane form a ‘belt-and-braces’ safety net that no silver-tongued fraudster can slip through. Companies should act now and make sure the next call will find a dead end rather than an open door.
Patrick Quirk is Senior Vice-President and General Manager at Opengear (www.opengear.com)
Dorset House
64 High Street
East Grinstead
RH19 3DE
UNITED KINGDOM
01342 31 4300