• English US
    • English
    • English AU

SOCIAL ENGINEERING

Staying alert to threats, right across the enterprise

It’s well-recognized that your people play a fundamental role in protecting the enterprise from malicious threats. The consequences of inadvertently opening the doors – both digital and physical – to cyber attackers can be wide-ranging, from short-term operational disruption to serious, long-term reputational damage.

Failing to address the human element of cyber risk exposure could rapidly undermine your technical defenses. Security assessments that incorporate social engineering are designed to reveal how well your staff follow company policies and procedures, highlighting where you need to adapt or refresh security processes to mitigate risk.

What we do

The precise scope of our industry-leading social engineering assessments can be tailored to your business, but the overall goal is to test how easily we can gain privileges and access to your systems, information and premises.

We test your susceptibility using a variety of techniques such as phishing attacks, Trojan viruses, phone phishing and attempting to gain unauthorized physical access. You will gain answers to questions such as: Would a member of staff share their password with a stranger posing as an auditor? Will employees hold the door open for someone wearing an ID badge without checking its authenticity?

The result is a comprehensive report that may make for uncomfortable reading but should provide a springboard to much-improved risk mitigation.

Technical Blog

Financial services case study – Mitigating social engineering risks

Read about how we performed a social engineering engagement for a leading financial services client.

TECHNICAL BLOG

How to spot phishing email attacks

This blog post includes an example phishing email and illustrates the types of techniques attackers use when targeting their victims. It includes tips on how to determine the legitimacy of an email.

WHY CHOOSE DIONACH?

INSIGHT-LED

Thanks to our in-house research and development team, we are the first to know about new techniques being used by attackers to trick people into divulging information. New insights are fed into our evaluations on a continual basis.

TAILOR-MADE SOLUTIONS

We design each of our tests based on your business, providing you with a bespoke service to deliver your specific goals.

KEY LEARNINGS

Access to our most senior consultants – and the depth of cross-sector knowledge they bring – is a standard part of our service.

Find out how we can help with your cyber challenge