Our testers would first perform the necessary research, just as a real attacker would. With that information, they'll work to gain your team's trust and—during the test—manipulate your personnel into granting access to critical data or physical resources.
Social engineering is the number one source of organizational compromise. Our team creates custom pretexts targeting your employees to see how they will respond when presented with a convincing attack.
Discover how many of your employees can identify a suspicious or malicious e-mail, phone call, or text message.
This type of assessment will examine how well your procedures are designed for disclosing information, whether they are strictly followed, and/or if they are sufficient to protect company and client information.
A social engineering campaign can reveal a lot regarding your more unique, less tech-focused aspects of cybersecurity and reduce the risk of these kinds of attacks, increasing your overall security.
Phishing, Smishing, Vishing Methodology: These services examine your employees' responses to unsolicited messaging, which could result in unauthorized access to your sensitive data. We’ll begin with passive reconnaissance to generate a list of targets in your organization. From there, an agreed-upon pretext is designed and executed, after which the results will be documented, verified, and assembled into a report.
Physical Breach Methodology: During this test, we’ll attempt to physically enter your facility as an external attacker, but that will take time and preparation. We’ll begin with passive and active information gathering regarding your environment through methods including, but not limited to Internet research, site observation, and wireless reconnaissance. Using the information we discover, we’ll craft scenarios for social engineering, determine where entry points are, identify internal security mechanisms, and acquire the necessary equipment. When the time arrives, we’ll attempt to gain access to the target location via the designed pretexts, unsecured points of entry, or other non-destructive means of entry before providing you with a deliverable that walks through each aspect of the project.
Schellman does perform social engineering campaigns—our Penetration Testing Team continues to grow and is currently comprised of individuals from different backgrounds including former developers, system administrators, and lifelong security professionals. Our team is incredibly experienced, and collectively holds the following professional certifications, among others
Engagements range from 1-3 weeks, depending on the number of campaigns, number of employees, and/or number of physical locations being targeted.
You can expect to pay no less than $14,500 for a social engineering attack with us.
We recommend you perform one annually at a minimum, though many organizations choose to have this done quarterly.
Keep in mind that your compliance initiative may require this assessment on an ongoing basis.
Our phishing attacks are customized for every engagement. First, we’ll look at the technologies and third parties your company works with and create convincing e-mails with a realistic and believable pretext. We will provide a few options you can choose from prior to the launch of the campaign.
It depends on what your goal is for the campaign. If you ask us to go after credentials, we’ll record any data submitted to the phishing login site. If you ask us to evaluate code execution, a small file or script will be run that will send back the username and machine name of the person who executed it.
There are 3 major things you should do:
Remember, the goal is to test how the employees will react when presented with a convincing phishing attack, not the effectiveness of the technical controls in place.