Black Box

In a black box style assessment, the social engineer begins the assessment with no prior information from the client, in order to see what types of intelligence (OSINT) they can find online. For these campaigns, the social engineer will gather E-mail addresses, phone numbers and information about the physical security controls to develop custom attack vectors. Benefits of black box assessments:

White Box

During white box assessments the client provides the targets they wish to be tested, such as: phone numbers, E-mail addresses, and locations.Benefits of white box assessments:

Intelligence Gathering

Attackers utilize intelligence gathering tactics against companies to search for information that could be found in job postings, employee social media accounts, or even third-party associations. Once intelligence is collected, they leverage it to create social engineering campaigns. Interactive Security utilizes the same tactics to gather intelligence.

Phishing

Phishing has been the starting point of many data breaches. It is imperative that companies are continuously training and testing for this style of attack. Our Phishing Assessments test what percentage of client employees will pass or fail to a phishing campaign.

Verbal Phishing (Phone/Voicemail)

Verbal Phishing is eliciting sensitive information via the phone. Interactive Security utilizes multiple approaches to gain information, such as spoofing phone numbers and impersonation, just as a malicious actor would.

Phishing

A Physical Assessment can validate clients’ physical security controls in place and company policies or show them areas that need improvement.Physical security controls, which Interactive Security will assess:

Company policies that may be tested:

Interactive Security has a full suite of social engineering assessment services that test all aspects of your human control areas. Interactive Security can customize these testing programs to evaluate the risk of information disclosure, using technical methods like online phishing, staff impersonation, pretext calling and physical control tests such as piggy-backing, lock testing, and other physical entry methods.Are you wondering about your organization’s data risks and are interested in a Social Engineering Assessment? Contact the Interactive Security team at 267-824-2500 or sales@intactsec.com.

We’re here to help make cybersecurity and compliance audits Obtainable, Simple and Affordable!