Colin Hadnagy explains how valuable lessons he’s learned over the past 5 years with Social-Engineer LLC (SECOM) were made real, very real in his first onsite social engineering engagement. Now that you’re primed, enjoy the final installment in our 4-part series with Colin’s first onsite SE gig, “My First Onsite Social Engineering Engagement: Pretenders, Assemble!”
Shelby Dacko recently participated in her first pen-testing onsite social engineering engagement. In the 3rd installment of our 4-part series, Shelby shares key lessons she learned from her team and advice so you can avoid her mistakes in the blog, “My First Pen-Testing Onsite Social Engineering Engagement”.
Curt Klump found himself standing in a server closet in a building’s network operations center (NOC), with an official employee escort. This is just one of the highlights of his first social engineering onsite infiltration job. In part 2 in our 4-part series, Curt tells his story in the blog “Breaking in for NOOBZ!: Social Engineering Onsite Infiltration”.
Recently, we sent 4 of our employees on an on-site social engineering engagement. We asked them to blog about their experience, tips and tricks, and lessons that they learned with our readers. As a special 4-part series, we will release one blog every week for the month of May. Each story is told from the individual’s viewpoint. Maxie Reynolds starts the series in her blog “An Inside Look at a Week in the Life of a Social Engineer”. She provides a list of helpful tips on what not to do on physical engagements and, maybe, a few things you should.
Whether it’s your work or personal accounts, your digital profile says a lot about you, your company, and your contacts. Are you part of the almost 69% of U.S. adults…
Targeted ransomware attacks on local US government entities—cities, schools, and police stations—are on the rise. In this blog learn you’ll learn why ransomware attacks are successful, what you can do to minimize the risk, and what to do if you are a victim.