SchellmanCON is back! Join us for our virtual conference on March 6 & 7, 2025

Contact Us
Services
Services
Crypto and Digital Trust
Crypto and Digital Trust
Schellman Training
Schellman Training
Sustainability Services
Sustainability Services
AI Services
AI Services
About Us
About Us
Leadership Team
Leadership Team
Corporate Social Responsibility
Corporate Social Responsibility
Careers
Careers
Strategic Partnerships
Strategic Partnerships

Penetration Testing

Social Engineering

E-mail (phishing), voice (vishing), text message (smishing), and/or physical breach attempts of your facilities are campaigns that, in simulating these real-world attack scenarios, can identify personnel training gaps and physical security issues.

Contact a Specialist Start Scoping Your Next Pen Test

What Happens During a Social Engineering Campaign?

Our testers would first perform the necessary research, just as a real attacker would. With that information, they'll work to gain your team's trust and—during the test—manipulate your personnel into granting access to critical data or physical resources. 

A Social Engineering Campaign Can Help You:

https://www.schellman.com/hubfs/social-prepare-for-real-world-attacks.svg

Prepare for Real-World Attacks

Social engineering is the number one source of organizational compromise. Our team creates custom pretexts targeting your employees to see how they will respond when presented with a convincing attack. 

https://www.schellman.com/hubfs/staff-awareness.svg

Raise Security Awareness Among Your Staff

Discover how many of your employees can identify a suspicious or malicious e-mail, phone call, or text message. 

https://www.schellman.com/hubfs/meet-compliance-requirements.png

Validate Your Security Process Implementation

This type of assessment will examine how well your procedures are designed for disclosing information, whether they are strictly followed, and/or if they are sufficient to protect company and client information.

https://www.schellman.com/hubfs/improve-security.png

Improve Your Security Posture

A social engineering campaign can reveal a lot regarding your more unique, less tech-focused aspects of cybersecurity and reduce the risk of these kinds of attacks, increasing your overall security.

Schellman’s Social Engineering Methodology

Phishing, Smishing, Vishing Methodology: These services examine your employees' responses to unsolicited messaging, which could result in unauthorized access to your sensitive data. We’ll begin with passive reconnaissance to generate a list of targets in your organization. From there, an agreed-upon pretext is designed and executed, after which the results will be documented, verified, and assembled into a report.  

Physical Breach Methodology: During this test, we’ll attempt to physically enter your facility as an external attacker, but that will take time and preparation. We’ll begin with passive and active information gathering regarding your environment through methods including, but not limited to Internet research, site observation, and wireless reconnaissance. Using the information we discover, we’ll craft scenarios for social engineering, determine where entry points are, identify internal security mechanisms, and acquire the necessary equipment. When the time arrives, we’ll attempt to gain access to the target location via the designed pretexts, unsecured points of entry, or other non-destructive means of entry before providing you with a deliverable that walks through each aspect of the project.

Is Schellman the Right Firm for You?

Schellman does perform social engineering campaigns—our Penetration Testing Team continues to grow and is currently comprised of individuals from different backgrounds including former developers, system administrators, and lifelong security professionals. Our team is incredibly experienced, and collectively holds the following professional certifications, among others

Frequently Asked Questions

How long will a social engineering campaign take?

What does a social engineering campaign cost at Schellman?

How often should I have a phishing simulation performed?

How do I decide on a specific pretext for my campaign?

What metrics do you record?

What should I do prior to the start of the campaign?

Take the first step in your Social Engineering Campaign

Our team of practice leaders, not sales, are ready to talk and help determine your best next steps.

Start Scoping Your Penetration Test Contact a Specialist