Social Engineering

Social Engineer Puppet

The art of influence.

Breaching the Human Firewall.

Social Engineering includes:

Phishing

Using phishing simulators, determine a baseline and track statistics. Work towards improving those numbers by developing a program.

Vishing

Test how vulnerable your organization is to phone based attacks and the amount of information that can be leaked just with a phone call.

Impersonations

Test the physical security of your organization with in-person attacks, security bypass, breaking an entry, lock picking, USB attacks, Wifi, and open ports.

With Certified Social Engineers, work with your security team to get comprehensive reports on gaps and remediations and set up a program to mitigate vulnerabilities in the system.