This talk deals with the weakest link in a company's security chain - the human. All technological efforts become obsolete when an attacker is able to manipulate an employee into revealing passwords or company secrets. This attack vector has grown in popularity since technological barriers are increasingly becoming harder to overcome. In this short introductory talk the basic principles of influence are discussed and it is shown how human traits allow for such manipulations. Additionally, it is explained how individuals can protect themselves from being manipulated in such a way.