Much of social engineering takes place via technology—phishing and vishing (voice phishing) being prime examples. However, holding a social engineering class virtually was not something Social-Engineer, LLC took lightly. Our…
During the past 6 years at Social-Engineer, LLC (SECOM) we’ve made over 45,000 calls to companies all over the world. Banks, startups, tech firms, pharmaceutical companies, defense contractors, and many other organizations have contracted us to do vishing (voice phishing) calls for them. Many of these employees are now working from home. That makes it a perfect time to review how to manage your vishing defenses from home.
Shelby Dacko recently participated in her first pen-testing onsite social engineering engagement. In the 3rd installment of our 4-part series, Shelby shares key lessons she learned from her team and advice so you can avoid her mistakes in the blog, “My First Pen-Testing Onsite Social Engineering Engagement”.
Curt Klump found himself standing in a server closet in a building’s network operations center (NOC), with an official employee escort. This is just one of the highlights of his first social engineering onsite infiltration job. In part 2 in our 4-part series, Curt tells his story in the blog “Breaking in for NOOBZ!: Social Engineering Onsite Infiltration”.
Recently, we sent 4 of our employees on an on-site social engineering engagement. We asked them to blog about their experience, tips and tricks, and lessons that they learned with our readers. As a special 4-part series, we will release one blog every week for the month of May. Each story is told from the individual’s viewpoint. Maxie Reynolds starts the series in her blog “An Inside Look at a Week in the Life of a Social Engineer”. She provides a list of helpful tips on what not to do on physical engagements and, maybe, a few things you should.
Whether it’s your work or personal accounts, your digital profile says a lot about you, your company, and your contacts. Are you part of the almost 69% of U.S. adults…
Targeted ransomware attacks on local US government entities—cities, schools, and police stations—are on the rise. In this blog learn you’ll learn why ransomware attacks are successful, what you can do to minimize the risk, and what to do if you are a victim.
If you are interested in the human side of security, then the specialty field of professional social engineering is for you. Find out how you can get started on this exciting career path in our April blog, “Are You Ready for a Career in Cybersecurity?”