During a penetration testing engagement, you have been tasked with assessing the susceptibility of employees to phishing attacks. Drawing upon the principles of influence, you decide to craft an email that will appear urgent, persuading recipients to click on a link to update their password immediately. The email will warn the recipients about a series of unauthorized login attempts detected on their accounts. Which method of influence best describes this tactic?
Scarcity
Authority
Social proof
Urgency