1. Schedule a 30-minute Discovery Session
2. We determine IF and HOW we can help
3. We provide a Tailored Proposal
4. Together, we review the Proposal
We use Social Engineering techniques to attempt to infect user computers or trick users to divulge sensitive information.
Email Phishing will measure how many users fall for the phishing ploy and click on a link or open an attachment.
Voice (Phone) phishing, aka Vishing, tactics will attempt to get users to provide sensitive data, such as usernames and passwords, over the phone.
We also perform in-person social engineering to bypass security controls and identify weaknesses in your policies and staff.
Our most popular social engineering service is our realistic phishing exercises.
Our Social Engineering testing services provides an economic way for you to measure the effectiveness of your Security Awareness training. Many attackers use social engineering tactics to take control of your systems. People, processes, and technologies have to work in concert to achieve a secure environment. Our Social Engineering campaigns test the people part of this triad.
The Social Engineering Report covers tactics used for both the email phishing and voice phishing campaigns, as well as any other authorized social engineering tactics. Phishing analytics will be provided for an email campaign that show how many users “fell” for the tactic used by clicking on a link or opening an attachment. Samples of phishing emails are included in this section of the report. The report also discusses tactics used for the phone phishing and discusses information gathered from in scope targets (typically a subset of users and the Helpdesk).
The number of cybersecurity incidents continues to climb. The variety of attacks continues to grow. It is no longer a question of if you will have a cyber event.