How a Potential Attacker Sees You
Our expert analysis of deep level OSINT (Open-Source Intelligence) serves as the basis for the four main simulated attack vectors: Vishing, Phishing, SMiShing, & Impersonation. These are customized thorough investigations providing actionable reporting and guidance for remediation.
Teaming
Deploy professionally trained SE Team agents for on-site impersonation day or night. Point-in-time testing of vendor/visitor access policies and physical perimeter. This full scope program is multi layered and may include badge cloning, credential harvesting, and network control.
Risk Assessment & Adversarial Simulation
This “human vulnerability scan” evaluates the security posture of your highest value employees or company as a whole.
Red Team Support
Augment your internal red team with trained and professional social engineers. We will work hand-in-hand with internal teams to test the human element of your network through remote consulting, feet-on-the-ground, and/or initial access testing through social engineering vectors.
Related Articles
October 22, 2018
Are All Social Engineers Bad?
When you think about what a social engineer does, and how influence and…
October 10, 2018
Information Risks of Travel
So, you’re on the road for work again, are you? Or, you’re heading out soon?…
August 7, 2018
It Is Important To Have Ethics In Social Engineering
Over the years of being a professional social engineer (SE), I have been asked…
June 14, 2018
Healthcare: Security in Crisis?
The other day my wife went to the doctor, and a few weeks before that we took…
April 16, 2015
Social-Engineer @ RSA 2015
Remember the days when RSA was an intimate little show with a few thousand…
February 2, 2015
The Rise of Multifaceted Social Engineering Attacks
In an October 2004 report, Gartner indicated the greatest security risk facing…