Much of social engineering takes place via technology—phishing and vishing (voice phishing) being prime examples. However, holding a social engineering class virtually was not something Social-Engineer, LLC took lightly. Our…
How is your industry faring in the cyberwar we all seem to find ourselves in? Business and security leaders the world over face the same dilemma: as they increase investment in sophisticated security, cybercrime continues to rise. In view of this, how do we combat cyber threats and keep ourselves, our industries, and our companies safe? Find out in our cross-industry examination.
During the past 6 years at Social-Engineer, LLC (SECOM) we’ve made over 45,000 calls to companies all over the world. Banks, startups, tech firms, pharmaceutical companies, defense contractors, and many other organizations have contracted us to do vishing (voice phishing) calls for them. Many of these employees are now working from home. That makes it a perfect time to review how to manage your vishing defenses from home.
Have you ever felt like you don’t deserve to be where you are professionally? Studies show that an estimated 70% of people have experienced Impostor Syndrome at one time in their life or another. Read what this is and how to overcome it in our latest blog, “Overcome the Impostor Syndrome ”.
Colin Hadnagy explains how valuable lessons he’s learned over the past 5 years with Social-Engineer LLC (SECOM) were made real, very real in his first onsite social engineering engagement. Now that you’re primed, enjoy the final installment in our 4-part series with Colin’s first onsite SE gig, “My First Onsite Social Engineering Engagement: Pretenders, Assemble!”
Shelby Dacko recently participated in her first pen-testing onsite social engineering engagement. In the 3rd installment of our 4-part series, Shelby shares key lessons she learned from her team and advice so you can avoid her mistakes in the blog, “My First Pen-Testing Onsite Social Engineering Engagement”.
Curt Klump found himself standing in a server closet in a building’s network operations center (NOC), with an official employee escort. This is just one of the highlights of his first social engineering onsite infiltration job. In part 2 in our 4-part series, Curt tells his story in the blog “Breaking in for NOOBZ!: Social Engineering Onsite Infiltration”.
Recently, we sent 4 of our employees on an on-site social engineering engagement. We asked them to blog about their experience, tips and tricks, and lessons that they learned with our readers. As a special 4-part series, we will release one blog every week for the month of May. Each story is told from the individual’s viewpoint. Maxie Reynolds starts the series in her blog “An Inside Look at a Week in the Life of a Social Engineer”. She provides a list of helpful tips on what not to do on physical engagements and, maybe, a few things you should.