Social Engineering

Regardless of the technologies implemented or the physical barriers created, the human element is often the most overlooked attack vector. Ironically, people are frequently one of the weakest links on a network and the easiest vulnerabilities to exploit.

Our team will use the social engineering vectors used by today’s intruders to test your organization’s people, processes and procedures in order to determine how vulnerable you are to a social engineering attack, with the potential to breach your network and obtain confidential information, getting the target to take a certain action or even gain physical access.

Get started

Social engineering relies in the act of manipulating a person to take an action that may or may not be in the targets best interest. This technique is based on specific attributes of human decision-making known as cognitive biases. To gain access to information that should ordinarily be protected, an attacker can manipulate these biases. Social Engineering cannot be a template or a procedure in the same way that many technology-centric tests can.