Social Engineering Services

Social Engineering relies on a set of technological, psychological, and physical techniques that trick a user into breaking security protocols. We will work with your organization with our safe, approved, and authorized replications of email-based attacks on targeted employees to test end user Security Awareness of Phishing, Spear Phishing, and other Social Engineering attacks.

Phishing

Phishing occurs when an attacker masquerades as a credible source, and sends an email requesting that a user performs an action (ex: clicks a URL, or opens an attachment) and conveys confidential information. Spear-Phishing is similar, but the attacker targets specific individuals and includes relevant information to appear even more convincing.

Vishing

Malicious attackers will attempt to call various individuals or groups to gather information about a target or in order to influence an action. For example, a common scenario would involve a hacker calling a help-desk to request that a new account be created.

Impersonation

Pretexting as another person or presenting a false identity can allow an attacker to gain access to information, facilities, or secure systems.

Got any social engineering questions?

Check our FAQ page