SOCIAL ENGINEERING

Staying alert to threats, right across the enterprise

It’s well-recognized that your people play a fundamental role in protecting the enterprise from malicious threats. The consequences of inadvertently opening the doors – both digital and physical – to cyber attackers can be wide-ranging, from short-term operational disruption to serious, long-term reputational damage.

Failing to address the human element of cyber risk exposure could rapidly undermine your technical defenses. Security assessments that incorporate social engineering are designed to reveal how well your staff follow company policies and procedures, highlighting where you need to adapt or refresh security processes to mitigate risk.

What we do

The precise scope of our industry-leading social engineering assessments can be tailored to your business, but the overall goal is to test how easily we can gain privileges and access to your systems, information and premises.

We test your susceptibility using a variety of techniques such as phishing attacks, Trojan viruses, phone phishing and attempting to gain unauthorized physical access. You will gain answers to questions such as: Would a member of staff share their password with a stranger posing as an auditor? Will employees hold the door open for someone wearing an ID badge without checking its authenticity?

The result is a comprehensive report that may make for uncomfortable reading but should provide a springboard to much-improved risk mitigation.

TECHNICAL BLOG

Financial services case study – Mitigating social engineering risks

Read about how we performed a social engineering engagement for a leading financial services client.

TECHNICAL BLOG

How to spot phishing email attacks

This blog post includes an example phishing email and illustrates the types of techniques attackers use when targeting their victims. It includes tips on how to determine the legitimacy of an email.

Related Posts

Find out how we can help with your cyber challenge