Social Engineering Risk Assessment

Are your employees trained against attacks?

The human element is usually the weakest link in any security system. Even the tightest security systems can be defeated by a single person acting in an unauthorized manner.

Why Work with us

  • Foresite provides this phase of a security risk assessment to determine how successful a social engineering attack would be, and the level of risk incurred by a social engineering attack.
  • Foresite will craft and attempt common real-world social engineering attacks, customized to fit your company and the environment.

Request a Quote.

Brands that Trust Us.

See What Our Clients Say.

Types of Social Engineering Attacks

Impersonation Attack

The zero-knowledge attacker may use publicly available information to impersonate a trusted individual such as a new hire, repairman, vendor, IT support, manager, trusted third party, or fellow employee to obtain physical access to a designated facility.

Spear Phishing

The attacker will craft an email designed to entice unsuspecting personnel to perform an action, usually clicking a website link or opening an attachment, that will cause a loss of some kind (usually credential exposure or remote control of the user’s system).

Media Drop

The attacker will prepare and distribute some type of disposable media (usually USB flash drive or CD) in calculated locations and in a strategic manner to entice personnel to view the contents of the media, triggering a notification or compromise of some kind.

Foresite by the numbers.

24/7

Security
Monitoring

900

Customers

95%

Customer Retention Rate

100%

Onshore security team with no outsourcing

Are your employees trained against attacks?

Let us help you stay ahead of social engineered attacks

See Our Service Pricing

STANDARD

$149+/mo*

ENHANCED

$899/mo*

ULTIMATE

$1199/mo*

Standard

$149+/mo*
ProVision
Vulnerability Assessment
Penetration Testing
Monitoring & Alerting
Device Management
MDR
Compliance
Breach Response
Patch Management

Enhanced

$899+/mo*
ProVision
Vulnerability Assessment
Penetration Testing
Monitoring & Alerting
Device Management
MDR
Compliance
Breach Response
Patch Management

Ultimate

$1,199+/mo*
ProVision
Vulnerability Assessment
Penetration Testing
Monitoring & Alerting
Device Management
MDR
Compliance
Breach Response
Patch Management
*A la carte and custom-tailored bundles available to meet your needs
Social Engineering Risk Assessment

Because this activity is illegal without the explicit permission of our customers, a corporate IT contact will be made aware of the approximate schedule of the attack(s), and the attacker will carry on his/her person a signed copy of sections 6 and 7 of the Terms and Conditions and Authorization agreement, acknowledging the legitimacy of his/her actions.

Case Studies

Search