Could Your Team Spot an Attack?
How easily would your employees spot and appropriately react to a real social engineering exploit? There’s only one safe, insightful way to find out: staging a simulated social engineering attack.
Social engineering is an extremely effective technique used by hackers worldwide to compromise internal systems and proprietary information assets. In fact, it’s one of the top two hacking techniques used by criminals to compromise organizations like yours.
With the use of savviness and Open Source Intelligence (OSINT) from social media or other publicly-accessible websites, malicious “social engineers” weave a convincing pretext via phone, email or in person— all with the goal of fooling members of your team into trusting them.
Putting your team through social engineering training is one thing, but testing their awareness outside the training modules is another.
In a social engineering test, our white hat social engineers leverage all the attack vectors a real cybercriminal would use to trick management and employees. To truly test your team’s cybersecurity readiness, we may:
Once you’re onboard, we’ll kick off with a chat with Kevin Mitnick himself, our team and your relevant team members. We’ll use this opportunity to discuss the engagement rules, what to expect and how to alert you if something is being detected during the testing phase.
Since our testing goes so far beyond simple baiting for link clicks, it’s during this call that we’ll identify your most guarded / sensitive information to target for access and exfiltration. We also use this time to identify any specific targets you want tested or excluded (contractors, CEO, C-Suite staff, interns, etc).
Because our goal is to be as unobtrusive as possible, we aim to gain access to your data or systems unnoticed. Your team may not even discover they’ve been compromised until you go over the findings with them directly.
Once testing commences, we’ll begin by gathering information on your organization and anyone with access to information systems or sensitive data. Then, it’s onto the fun part! Our master social engineers develop the ruse, pretext and situations we’ll use to influence the people— which involves extensive planning before any attack is made. It’s our superior preliminary research and strategizing that set allows our white hat social engineers to develop plausible situations that are realistic, credible and trustworthy. And it’s also the reason Mitnick Security is proud to boast a 100% success rate when using social engineering to test systems.
If necessary, we work closely with your team to define and customize the test scenarios to test specific policies, procedures and processes. For instance, if your organization has incident response procedures for reporting suspicious phone calls, text/instant messages, or emails, Mitnick Security can test these procedures and the overall effectiveness of your existing security awareness-training programs.
After a few weeks, or the specific terms of your testing period, we’ll schedule a final call to go over our findings.
Your detailed and easy-to-explain report will include a walkthrough of our simulated cyberattacks. You’ll know exactly which personnel were tested, the details of each attempt and our expert recommendations for fortifying your current policies. We’ll even help your IT team to implement new (or adjust old) security policies that reflect today’s social engineering threats and the results of our test.
Toll Free (USA & Canada)
(855) 411-1166
Local and International
(702) 940-9881
Security Services and Support:
info@mitnicksecurity.com
Speaking Engagements and Media:
speakingrequests@mitnicksecurity.com
© Copyright 2004 - 2023 Mitnick Security Consulting LLC. All rights Reserved. | Privacy Policy