Social Engineering

Choose from 80+ sections divided into 9 categories from Hero through Blog to Overlays and many more.

We help banks, of all sizes, meet their risk + compliance goals.

Social engineering is the manipulation of people through communication, whether in- person or digitally, to get them to take a certain action or divulge confidential information allowing the criminal to penetrate an organization’s Information Security defenses.

Advancements in mobile technology and the growing dominance of social media are continuously creating novel opportunities for cyber criminals to carry out successful attacks.

We help enterprises increase awareness of evolving attack vectors, simulate social engineering attacks to test their organization, and provide awareness training to employees.

Types of Social Engineering

Choose from 80+ sections divided into 9 categories from Hero through Blog to Overlays and many more.

Smishing

SMS phishing, also known as “smishing”, employs the same techniques as email phishing, but the inital messages are delivered by SMS text. The messages usually contain a link to a fraudulent website or request submittal of private information such as the PIN to the devices SIM card.

Vishing

Vishing, or "voice phishing", is social engineering using telephone systems as the method of attack to gain access to sensitive information information, usually for financial reward. It is also employed by attackers for reconnaissance purposes to gather more detailed intelligence on a target organization to design a larger attack.

Phising

Phishing is a social engineering attack delivered by email. Typically, the bad actor sends an email that appears to come from a legitimate business - a social network, bank, credit beureau -requesting "verification" of information and warning of some dire consequence if it is not provided. The e-mail usually contains a link to a fraudulent web page that resembles a web page of the legitimate company and has a form requesting sensitive information such as debit card PIN, social security number, account numbers, or private customer information.

Not all phishing attacks require the targeted employee to open an attachment. Following a link in an out-of-date browser, can compromise your system.

Solutions

Choose from 80+ sections divided into 9 categories from Hero through Blog to Overlays and many more.

• Managed Services. Routine testing of an organization by simulating modern attacks provide a truthful understanding of the security awareness of your employees and introduces a meaningful variable to use in quantifying your organization’s value at risk.

Software. Leverage our software platform to perform your own social engineering tests internally, automate awareness training, and measure your organizations change over time.

Awareness Training. Onsite or remote security awareness training customized to your organization the seniority level of the audience.

What can
we help you achieve?

We’re here to help and answer any question you might have. We look forward to hearing from you.

Social Engineering

Choose from 80+ sections divided into 9 categories from Hero through Blog to Overlays and many more.

We help banks, of all sizes, meet their risk + compliance goals.

Social engineering is the manipulation of people through communication, whether in- person or digitally, to get them to take a certain action or divulge confidential information allowing the criminal to penetrate an organization’s Information Security defenses.

Advancements in mobile technology and the growing dominance of social media are continuously creating novel opportunities for cyber criminals to carry out successful attacks.

We help enterprises increase awareness of evolving attack vectors, simulate social engineering attacks to test their organization, and provide awareness training to employees.

Types of Social Engineering

Choose from 80+ sections divided into 9 categories from Hero through Blog to Overlays and many more.

The three most common attack vectors for social engineering are SMS, email, and phone. Modern attacks often leverage more than one media channel and take advantage of current events such as politics, natural disasters, or social movements.

Smishing

SMS phishing, also known as “smishing”, employs the same techniques as email phishing, but the inital messages are delivered by SMS text. The messages usually contain a link to a fraudulent website or request submittal of private information such as the PIN to the devices SIM card.

Vishing

Vishing, or "voice phishing", is social engineering using telephone systems as the method of attack to gain access to sensitive information information, usually for financial reward. It is also employed by attackers for reconnaissance purposes to gather more detailed intelligence on a target organization to design a larger attack.

Phishing

Phishing is a social engineering attack delivered by email. Typically, the bad actor sends an email that appears to come from a legitimate business - a social network, bank, credit beureau -requesting "verification" of information and warning of some dire consequence if it is not provided. The e-mail usually contains a link to a fraudulent web page that resembles a web page of the legitimate company and has a form requesting sensitive information such as debit card PIN, social security number, account numbers, or private customer information.

Not all phishing attacks require the targeted employee to open an attachment. Following a link in an out-of-date browser, can compromise your system.

Solutions

Choose from 80+ sections divided into 9 categories from Hero through Blog to Overlays and many more.

• Managed Services. Routine testing of an organization by simulating modern attacks provide a truthful understanding of the security awareness of your employees and introduces a meaningful variable to use in quantifying your organization’s value at risk.

• Software. Leverage our software platform to perform your own social engineering tests internally, automate awareness training, and measure your organizations change over time.

• Awareness Training. Onsite or remote security awareness training customized to your organization the seniority level of the audience.

What can we help you achieve?

We’re here to help and answer any question you might have. We look forward to hearing from you.

FREE TOOLS

Always easy, always free.

TraceSRA

Select

TraceCSAT

Select
Cancel