ICE 2022 LOGO

27-28 SEPTEMBER 2022
OLYMPIA LONDON

Exhibitor Products

Image

Social Engineering

Pentest People Stand: C45

Security breaches of corporate IT networks are often thought to only come as a result of a malicious attack from technically competent computer hackers. However, Social Engineering is increasingly being used to help hackers bypass the initial IT security barriers.

Overly helpful employees lacking security awareness can often be duped into providing access to corporate offices or restricted areas such as IT data centres where the hacker has no authorised access.

Using a mix of methodologies Social Engineering attacks can come via a seemingly innocent telephone call, forged email or by physical visits to corporate offices.

What Are The Risks?

The people and process element of security is often overlooked when allocating budget to Penetration Testing engagements.  It is no surprise that attackers are also aware of this and looking at some very high profile attacks it is clear that Social Engineering techniques were utilised by the attackers as a way to extract reconnaissance information or to gain access to physical locations.

How Can We Help? 

Pentest People’s Social Engineering testing service experts are adept at discovering and exploiting operational weaknesses in corporate policies and procedures that can unwittingly lead to unauthorised access to restricted systems.

Using the Open Social Engineering Framework methodology, our social engineering assessment consultants can set up a covert Social Engineering project aimed at testing the robustness of your internal systems and provide practical advice on what changes are needed to prevent a real attack succeeding.

The service would be delivered as part of the Pentest People Penetration Testing as a Service (PTaaS) and full access to the SecurePortal and other complementary tools would be provided.

 

View all Exhibitor Products
Loading