Social Engineering Penetration Testing

Here you can receive practical assessment of your employees’ awareness level in current cyberthreats and schedule specific trainings in cybersecurity basics.

We use 4 methods of attack emulation:

  • Phishing mailings: we send phishing e-mails, which imitate legitimate letters, to your employees, where we induce the recipient to go to illegitimate resources and open illegitimate programs.
  • Phishing websites: we create websites that imitate your corporate style in order to mislead users and make them enter their credentials from corporate accounts.
  • Phishing data storage devices: we place USB-drives with your brand marks around your office, so that your employees that find the devices are inspired to open a specifically modified document.  
  • Phone phishing: we call your employees and build a conversation in accordance with the prearranged scenario in order to make them reveal confidential information.

Results

Your employees become aware of current cyberthreats and network intrusion techniques as well as get information on the ways of countering cybercriminals. All this allows to raise effectiveness of response to intrusion attempts and reduce cybersecurity risks. 


Order

Reasonable and appropriate measures are taken to ensure that your personal data is protected from unauthorized access or modification, unlawful destruction, and improper use. No information provided by you will be made available to third parties. Personal data will be held only for as long as is necessary for the purpose for which it is provided and, in any event, will only be kept for 24 months after any application you have made has been completed. By submitting your personal information, you consent to the use of your information as set out in this statement.