The human element is usually the weakest link in any security system. Even the tightest security systems can be defeated by a single person acting in an unauthorized manner.
Why Work with us
The zero-knowledge attacker may use publicly available information to impersonate a trusted individual such as a new hire, repairman, vendor, IT support, manager, trusted third party, or fellow employee to obtain physical access to a designated facility.
The attacker will craft an email designed to entice unsuspecting personnel to perform an action, usually clicking a website link or opening an attachment, that will cause a loss of some kind (usually credential exposure or remote control of the user’s system).
The attacker will prepare and distribute some type of disposable media (usually USB flash drive or CD) in calculated locations and in a strategic manner to entice personnel to view the contents of the media, triggering a notification or compromise of some kind.
Let us help you stay ahead of social engineered attacks
Because this activity is illegal without the explicit permission of our customers, a corporate IT contact will be made aware of the approximate schedule of the attack(s), and the attacker will carry on his/her person a signed copy of sections 6 and 7 of the Terms and Conditions and Authorization agreement, acknowledging the legitimacy of his/her actions.
7311 West 132nd Street, Suite 305
Overland Park, KS 66213
1 Hartfield Blvd,
Suite 300
East Windsor, CT 06088