A social engineering assessment is a test of an organization’s human vulnerabilities. Since people are often the weakest link in any security strategy, testing employees and associated security policies is a smart best practice. Assessments can test resilience to email phishing, vishing (voice calls), and on-site attempts to gain access to restricted areas and exfiltrate confidential data. This valuable assessment quickly identifies the efficacy of human-related security initiatives and which areas need to be addressed.
Every assessment engagement is tailored to your desires. We work with you to build and execute a meaningful campaign. This includes the creation of authentic-feeling attacks that are appropriate for your organization. It is also determining if there are specific attacks for which you’d like to focus. We regularly test these common attack types:
Phishing. The most common social engineering attack. An attacker sends links via email or social media to a spoofed website. The target is lured to the site in an attempt to capture information, including credit card numbers.
Spear Phishing. A variation on phishing, one with higher success rates. Falsified emails appear to be sent from a known or trusted source to trick the target into revealing confidential information or taking desired actions. A spear phishing attack targets something in particular. An attacker may engage in social engineering to impersonate those in management roles or coworkers in order to connect with you in a more convincing way. When an email from the CEO oddly asks for twenty gift cards, that’s spear phishing.
Vishing. Rather than using email to get you to reveal personal, or confidential information, vishing takes place over the telephone. An attacker is most likely to directly call a company or department impersonating an internal employee or external partner in need of information or help. By spoofing a legitimate phone number, an attacker may lead the target to believe the call is legitimate and disclose information.
USB Drop. Thumb drives are used universally nowadays. In this engagement, an attacker leaves an infected USB drive laying around in the parking lot in hopes that someone will plug it in out of curiosity. In this case, the USB may be configured to automatically run once plugged into a computer and execute malicious code giving the attackers access to the system and a network to play in.
Tailgating. A social engineering tactic to gain physical access to a restricted space. The attacker simply follows someone with a key card or approved access through the door.
Clients find this service most valuable when they want to test that employees are following established protocols and to discover vulnerable gaps. Testing provides valuable information about the weakest link in your security chain. It also helps validate the effectiveness of security awareness training. And simply by testing, you’ll drive awareness and participation in security procedures.
Interested in talking to one of our experts?
Contact us by filling out the form below.