Social Engineering Assessment

Are your employees prepared for Social Engineering attacks?

It’s not enough to have a good firewall, some attackers know how to gain access by fooling people.

How does this work?

Our service will assess your team’s reaction to this kind of attacks. Attacks are different from time to time, and bad actors are always finding new ways of breaching your systems.

...
  • Our Social Engineering Audits are conducted both through electronic systems and phone calls

  • The test gathers open-source information in order to impersonate authorities, employing techniques such as:

  • Spear Phishing, alongside simulated endpoint exploitation

  • Phone-based engineering using Caller ID and SMS spoofing, alongside Voice Phishing

  • Engineering through distributed USB devices with simulated malware

  • All services come with detailed reporting, user tracking and event classification

  • Continued e-learning for further education