Social Engineering

  • Home
  • Social Engineering
Social Engineering

Testing the level of security training and knowledge your employees truly possess.

Employees are the greatest security risk any company can have. It takes just one employee to fall for a phishing scam to expose your entire organization to a hacker. Simulated attacks that reveal your team’s security shortcuts, followed by security training, is the best way to avoid an attack.

CIMS is highly skilled in manipulating your team to break normal security procedures. When we conduct your social engineering, we’ll typically obtain privileged information from 25% of your employees.

Types of Social Engineering:

CIMS team will simulate real life social engineering attacks including:

  • Phishing (Generic)
  • Spear Phishing
  • Pretext Calling (Vishing)

Attack types ( CIMS)

Phishing (Generic)

A broad attack that targets individuals or groups of individuals and not a specific company. These attacks are commonly seen as unsolicited emails or postings.
Spear Phishing

Spear Phishing

Targets a specific company or person and uses what is regarded as inside information to gain trust before influencing an action.

Pretext Calling (Vishing)

Utilizes the phone to gain sensitive information such as company logistics, technology or specific employee information.
Physical Social Engineering.

In-person attacks designed to test access controls and employee resistance to being socially engineered.

Related Posts

Penetration Testing

Penetration testing helps to uncover architectural and conceptual issues through emulated, real-world attacks.

Read More

Threat Hunter

CIMS Threat hunters identify advanced threats, and then track and mitigate them before clients organizational

Read More

Incident Responder

Incident response is an organized approach to rapidly responding to the aftermath of a security

Read More