Social Engineering Penetration Testing
Here you can receive practical assessment of your employees’ awareness level in current cyberthreats and schedule specific trainings in cybersecurity basics.
We use 4 methods of attack emulation:
- Phishing mailings: we send phishing e-mails, which imitate legitimate letters, to your employees, where we induce the recipient to go to illegitimate resources and open illegitimate programs.
- Phishing websites: we create websites that imitate your corporate style in order to mislead users and make them enter their credentials from corporate accounts.
- Phishing data storage devices: we place USB-drives with your brand marks around your office, so that your employees that find the devices are inspired to open a specifically modified document.
- Phone phishing: we call your employees and build a conversation in accordance with the prearranged scenario in order to make them reveal confidential information.
Your employees become aware of current cyberthreats and network intrusion techniques as well as get information on the ways of countering cybercriminals. All this allows to raise effectiveness of response to intrusion attempts and reduce cybersecurity risks.