During the past 6 years at Social-Engineer, LLC (SECOM) we’ve made over 45,000 calls to companies all over the world. Banks, startups, tech firms, pharmaceutical companies, defense contractors, and many other organizations have contracted us to do vishing (voice phishing) calls for them. Many of these employees are now working from home. That makes it a perfect time to review how to manage your vishing defenses from home.
Shelby Dacko recently participated in her first pen-testing onsite social engineering engagement. In the 3rd installment of our 4-part series, Shelby shares key lessons she learned from her team and advice so you can avoid her mistakes in the blog, “My First Pen-Testing Onsite Social Engineering Engagement”.
Curt Klump found himself standing in a server closet in a building’s network operations center (NOC), with an official employee escort. This is just one of the highlights of his first social engineering onsite infiltration job. In part 2 in our 4-part series, Curt tells his story in the blog “Breaking in for NOOBZ!: Social Engineering Onsite Infiltration”.
Whether it’s your work or personal accounts, your digital profile says a lot about you, your company, and your contacts. Are you part of the almost 69% of U.S. adults…
Targeted ransomware attacks on local US government entities—cities, schools, and police stations—are on the rise. In this blog learn you’ll learn why ransomware attacks are successful, what you can do to minimize the risk, and what to do if you are a victim.
If you are interested in the human side of security, then the specialty field of professional social engineering is for you. Find out how you can get started on this exciting career path in our April blog, “Are You Ready for a Career in Cybersecurity?”