Secure. Comply. Save.
Social Engineering Assessments
The human element continues to pose the greatest risk to the data that an organization holds on behalf of their clients. Whether that information is credit card information, protected health information, or any other type of confidential, sensitive data, Social Engineering remains one of the most commonly used tactics for hackers and thieves to gain access to your critical systems. While investing in the top of the line technology is critical to keep unauthorized users out of your system, creating a culture of security and investing in your employees as the first line of defense is essential for organizations of all sizes and across all vertical markets.
Compass IT Compliance performs Social Engineering Assessments for organizations to give them a true snapshot of the controls that they have in place today versus areas of weakness within an organization to provide them with a true gap analysis and remediation plan to effectively build a culture of security and keep the data they possess safe. All of the Social Engineering Assessments that we provide are tailored to your organizations needs and all tests that we perform as a part of the Social Engineering Assessment are conducted in a controlled environment. Compass then provides you with detailed reporting on the activities performed and the potential impact to your business.
Some of the services that we include in our Social Engineering Assessments are:
- Phishing Campaigns - Emails that are sent to a wide variety of employees at an organization to see who clicks on a suspicious link, how many times they click on a link, etc.
- Spear Phishing Campaigns - Similar to phishing emails, however they are targeted towards specific personnel and incorporate a higher level of sophistication
- Pretext Calling - Phone based assessment to attempt to gather critical information such as user names, passwords, account numbers, etc.
- Physical Site Visits - Assessment technique where Compass physically goes to your location(s) to attempt to gain access to your building, gain access to restricted areas, dumpster diving, after hours walkthroughs, etc.