During the past 6 years at Social-Engineer, LLC (SECOM) we’ve made over 45,000 calls to companies all over the world. Banks, startups, tech firms, pharmaceutical companies, defense contractors, and many other organizations have contracted us to do vishing (voice phishing) calls for them. Many of these employees are now working from home. That makes it a perfect time to review how to manage your vishing defenses from home.
Colin Hadnagy explains how valuable lessons he’s learned over the past 5 years with Social-Engineer LLC (SECOM) were made real, very real in his first onsite social engineering engagement. Now that you’re primed, enjoy the final installment in our 4-part series with Colin’s first onsite SE gig, “My First Onsite Social Engineering Engagement: Pretenders, Assemble!”
Shelby Dacko recently participated in her first pen-testing onsite social engineering engagement. In the 3rd installment of our 4-part series, Shelby shares key lessons she learned from her team and advice so you can avoid her mistakes in the blog, “My First Pen-Testing Onsite Social Engineering Engagement”.
Curt Klump found himself standing in a server closet in a building’s network operations center (NOC), with an official employee escort. This is just one of the highlights of his first social engineering onsite infiltration job. In part 2 in our 4-part series, Curt tells his story in the blog “Breaking in for NOOBZ!: Social Engineering Onsite Infiltration”.
Recently, we sent 4 of our employees on an on-site social engineering engagement. We asked them to blog about their experience, tips and tricks, and lessons that they learned with our readers. As a special 4-part series, we will release one blog every week for the month of May. Each story is told from the individual’s viewpoint. Maxie Reynolds starts the series in her blog “An Inside Look at a Week in the Life of a Social Engineer”. She provides a list of helpful tips on what not to do on physical engagements and, maybe, a few things you should.
While employees are increasingly becoming informed about the threat phishing attacks pose to organizations, attackers are now combining other types of vectors to compromise their targets. The one we see…
The Fifth Annual Benchmark study on Privacy and Security of Healthcare Data by Ponemon Institute has recently revealed what others have long perceived: There has been a shift in the…