Social Engineering Exercises

Our Social Engineering Exercise will measure the effectiveness of your organization's process-level and IT controls.

It starts with Open Source intelligence gathering to derive information about your organization, location, structure, technology, procedures and staff, including manners of contact through email addresses and phone numbers. Based on this we will develop multiple scenarios to attack these touch points to gain access to unauthorized information, systems or locations.

Execution of these strategies will involve engaging staff through email, phone conversations, online chat or face to face discussions, utilizing information collected and derived about the people and organization from our Open Source searching. The form of information derived through these scenarios and reactions to our probing will be aggregated into organizational trends to identify countermeasures to these procedural and IT-based weaknesses