Social Engineering

Let Pentest People research, develop and manage an assessment of the security of your people and processes utilising the latest techniques.

Understand the Security Threats posed by your People and Processes.

Perform regular Social Engineering Assessments to understand the threat to your business.

PenTest People can design and perform these Social Engineering assessments on your behalf.

Social Engineering Assessments

Security breaches of corporate IT networks are often thought to only come as a result of a malicious attack from technically competent computer hackers. However, Social Engineering is increasingly being used to help hackers bypass the initial IT security barriers.

Overly helpful employees lacking security awareness can often be duped into providing access to corporate offices or restricted areas such as IT data centres where the hacker has no authorised access.

Using a mix of methodologies Social Engineering attacks can come via a seemingly innocent telephone call, forged email or by physical visits to corporate offices.

What are the risks?

The people and process element of security is often overlooked when allocating budget to Penetration Testing engagements.  It is no surprise that attackers are also aware of this and looking at some very high profile attacks it is clear that Social Engineering techniques were utilised by the attackers as a way to extract reconnaissance information or to gain access to physical locations.

How can we help?

Pentest People’s Social Engineering experts are adept at discovering and exploiting operational weaknesses in corporate policies and procedures that can unwittingly lead to unauthorised access to restricted systems.

Using the Open Social Engineering Framework methodology, our consultants can set up a covert Social Engineering project aimed at testing the robustness of your internal systems and provide practical advice on what changes are needed to prevent a real attack succeeding.

The service would be delivered as part of the Pentest People Penetration Testing as a Service (PTaaS) and full access to the SecurePortal and other complementary tools would be provided.

Find Out More Now!

Social Engineering

Key Benefits

  • Identify Security Vulnerabilities within your People and Processes allowing you to proactively remediate any issues that arise
  • Improve your security posture, allowing you to reduce the threat of a cyber attack occurring against your business
  • Comply with various regulatory bodies who mandate regular Social Engineering Testing be performed within your infrastructure
  • Be able to prove to your supply chain that you are taking the necessary precautions to ensure your strong security posture
  • Be able to focus efforts on important security issues by identifying the high-risk items identified in the Social Engineering Testing report

Frequently Asked Questions

  • What is Social Engineering?

    Social Engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional “con” in that it is often one of many steps in a more complex fraud scheme.

  • How does Social Engineering differ from a Pen Test?

    Social Engineering is part of an overall Penetration Testing engagement. Traditionally Penetration Testing only assesses systems and infrastructure where Social Engineering is assessing the People and Policies for security weaknesses.

  • What types of Social Engineering can you offer?

    Social Engineering is a very bespoke service and Pentest People are experienced in all aspects of assessments. Due to the bespoke nature, it is best to Get In Touch with us to discuss your exact requirements.

  • What is the deliverable from the service?

    The deliverable from this service is a full Social Engineering Test Report that is uploaded to our SecurePortal and available for you to interact with.

    This differs from the competition in the way this is delivered and we believe this is a much clearer way to work with an manage the results of the assessment.