Implementing Security by simulating attacks

Penetration Testing – People

People

bluedash

You are only as secure as your least secure member of your staff.

Social Engineering attacks typically lead to:

  • Malware in your infrastructure
  • Leak of company secrets (Corporate Espionage)
  • Physical access to your machines
  • Compromising your infrastructure

What is it?

bluedash

Testing the awareness of social engineering in your company. Attacking either key personnel or the entire company. Utilizing social engineering to get either compromising information, critical business secrets or user credentials to company infrastructure 

How is it done?

bluedash

Our Process:

  • Reconnaissance on the targets
  • Using gathered information to prepare social engineering attacks.
  • Attempting the social engineering attacks
  • Evaluating results

Typical attack methods:

  • Phishing
  • Spearphishing
  • Whaling
  • Smishing
  • Vishing
  • Dumpster diving

What do we deliver?

bluedash

Depending on goal of social engineering campaign, the results will be illustrated through visualization like phishing campaign statistics.  

Get in touch with our expert

Kasper Brandt, Nordic Cyber Security Lead