Some attacks work very well if the attacker is impersonating an employee the victim know is real. This will help keeping the victim off-guard. This have some requirements to work. If the victim knows the person being impersonated, a different voice, different wording in emails and similar issues will almost certainly trigger suspicion.