Icon5.png

Spear Phishing Social Engineering Testing

The following is placeholder text known as “lorem ipsum,” which is scrambled Latin used by designers to mimic real copy. Nulla eu pretium massa. Class aptent taciti sociosqu ad litora torquent per conubia nostra, per inceptos himenaeos. Aenean eu justo sed elit dignissim aliquam. Nulla lectus ante, consequat et ex eget, feugiat tincidunt metus.

Aenean eu justo sed elit dignissim aliquam. Nulla lectus ante, consequat et ex eget, feugiat tincidunt metus.

Voice Social Engineering Testing

The following is placeholder text known as “lorem ipsum,” which is scrambled Latin used by designers to mimic real copy. Donec ac fringilla turpis. Donec ac fringilla turpis. Class aptent taciti sociosqu ad litora torquent per conubia nostra, per inceptos himenaeos. Aliquam bibendum, turpis eu mattis iaculis, ex lorem mollis sem, ut sollicitudin risus orci quis tellus. Donec eu est non lacus lacinia semper.

Maecenas non leo laoreet, condimentum lorem nec, vulputate massa. Maecenas non leo laoreet, condimentum lorem nec, vulputate massa. Quisque congue porttitor ullamcorper. Suspendisse nec congue purus.

Onsite Social Engineering Testing

The E3 Social Engineering Testing evaluates whether adequate physical security exists and employees are properly trained to prevent unauthorized access to sensitive information. These simulations help heighten staff awareness to potential real world threats that may target them.  Sensitive information is not limited to but may include items like, backup tapes, removable media, statements, reports or paper with sensitive customer information, or physical access to the institutions Local Area Network. 

Social engineering simulations are clearly designed to evaluate the institution as whole and not to single out inadequate employee performance.