This type of penetration testing is carried out using social engineering methods. The main purpose of the test is to identify the level of awareness of the customer’s personnel about information security requirements. During the testing process, the reaction of users and information security personnel to organizational penetration methods used by attackers is tested.
Social engineering methods are often used by attackers and are usually aimed at end users. As a result of a successful attack, an attacker can gain control of workstations, obtain confidential customer documents, use customer resources to organize attacks on the systems of other companies, send spam, etc.
Organizational aspects of information security are the most important component of the protection system and, often, ordinary users are the weakest link. This service will allow us to identify those organizational aspects of information security that the customer should pay attention to first.
The results obtained during the course of this service can become the basis for the development of a Security Awareness Program, with enhanced focused on the problem areas identified during testing. This service is also used for testing the effectiveness of an existing Customer Awareness Program.
Social engineering methods that will be used to conduct the test are agreed upon with the customer in advance. The following methods can be used:
Cyber Security Awareness Test
Spear phishing by department
Phishing with malware
Lecture on Cyber Security Awareness
Our company provides the following services:
Primary technological and basic checks in the field of information security. Inspection of the network architecture, security systems, access rights. Construction of a risk map.
More DetailsThis test identifies existing vulnerabilities in the infrastructure in order to formulate recommendations for their elimination.
Testing using social engineering methods. The purpose of the test is to identify the staff’s level cyber security threat awareness.
Lectures and trainings on staff awareness of information security threats, as well as trainings on secure development for programmers.
Checking the security of the company according to the protocol. The purpose of the audit is to show in which areas of information security there are shortcomings and how to correct them.
More DetailsWhen a cyber incident occurs, it is important to understand exactly what happened and how, and to address the causes and gaps in the firm's information security.
More DetailsThe email attack simulation tests the effectiveness of email security tools such as email gateways, antiviruses, sandboxes and others.
More DetailsWe will identify weaknesses in mobile and web applications, in remote service systems and develop recommendations for eliminating detected vulnerabilities.
More DetailsWe will identify problems in protecting user computers for running malicious applications and monitoring the
system.
Since 2010, we have done a lot of work. This includes penetration tests and security audits, risk management, incident investigations, as well as consultations and solution design.