SureCloud logo
Request a demo Contact us Resources

Challenge

Social engineering techniques seek to manipulate your employee’s into performing actions or divulging information. Processes put in place to help resist such attacks are only valuable if they are regularly checked for effectiveness.

Solution

SureCloud’s Social Engineering testing services attempt to coerce employees to negate security processes through the use of various social techniques (phishing, spear phishing, whaling, voice or mobile messaging or physical on-site social engineering) in the attempt to gain unauthorized access or theft of sensitive data.

Social Engineering Features

Designed to give you certainty across the company

Social Engineering Testing

Social Engineering Testing

Includes onsite social engineering and physical access testing, physical security reviews, email phishing campaigns, targeted phone social engineering, social media penetration testing.

Post-test Deliverables: Management Report

Post-test Deliverables: Management Report

Details each finding from the security assessment, consultants' commentaries and remediation priorities.

Post-test Deliverables: Technical Report

Post-test Deliverables: Technical Report

Similar to a traditional pentest report, lists all vulnerabilities identified during the assessment.

Post-test Deliverables: Debrief Meeting

Post-test Deliverables: Debrief Meeting

A summary/debrief meeting with you onsite or via web conference.

Vulnerability Manager

Vulnerability Manager

At no additional fee, we provide 12 months of access to our Vulnerability Manager to help keep you strong beyond your test.

Loved by companies around the world

Resources for Social Engineering

  • Blog
Social Engineering is integral for penetration testing | SureCloud

Hacking People – The Psychology of Social Engineering

While much of the focus of penetration testing is often centered on the tools of cyber-attacks, …

Read more
  • Blog

Women in Information Security: Sarka

Due to popular demand, my women in information security interview series is back for autumn! This …

Read more
  • Press Release
SureCloud Cyber Risk Management Solutions

Getting Your Own Hacker Beats Letting Outsiders In

A social engineer will start by gathering Open Source Intelligence (OSINT) and the sleuthing continues using …

Read more

Get Started with SureCloud