Social Engineering Penetration Testing

It is generally acknowledged that that employees represent your greatest information and cyber security risk.  Many data breaches are internal rather than external and are caused by employees who have been negligent, careless, or unaware of security policies and Internet-related threats.  One of the biggest threats are social engineering and phishing attacks, i.e., fraudulent attempts by malicious hackers to get users to divulge sensitive information or click on links etc.  Naturally, the potential impact to the organisation of users clicking on unknown links and providing confidential information could be extremely damaging.  In order to establish how susceptible users are to responding to such risks, URM is able to simulate a targeted social engineering attack.  

URM has developed an effective methodology aimed at determining and measuring user awareness and vigilance to phishing attempts and processing of incoming third-party emails.  Working closely with sponsors from your organisation, we will develop micro websites and a campaign of orchestrated emails aimed at inducing users to open the email, click on a link and provide sensitive information e.g., passwords.  When developing the micro websites and emails, URM is highly proficient at imitating the intended email/website and evolving and modifying the campaign as users begin to interact with the emails, looking to exploit a range of human emotions, e.g., fear, greed, urgency, helpfulness and curiosity.  

At the end of the exercise, through the use of our tracking software, we are able to report back on the number of users who potentially exposed the organisation to the risk of a data breach or to malicious software.  Once completed, the results of the exercise can then form a very powerful component of any staff awareness programme. By referring to the actions of personnel from the actual organisation, cyber risk is no longer an abstract term but something users can practically relate to.  Having been involved in numerous social engineering campaigns, URM has found such exercises to be effective in not just raising awareness but in changing behaviour.

Why URM?

Tailored Solutions

Every social networking exercise URM conducts is totally tailored to your organisation.  Working with sponsors, we will aim to understand particular concerns, threats or issues and develop fully customised campaigns.  In terms of recipients of emails, this can again be the whole organisation or specific functions or departments.  In addition to cyber-related exercises, URM is also able to develop physical and telephone-based social engineering exercises, e.g., imitating members of the IT Department and asking users to reveal confidential information.

Getting the Balance Right

Getting the balance right is absolutely central to the success of any social engineering campaign.  For example, when coming up with microsites and emails in a phishing exercise, it is important to produce something which has a similar look and feel whilst including a number of ‘give away’ discrepancies (e.g., domain names, spelling errors) that should be picked up the users.  URM is highly skilled at achieving the optimum balance in this respect.

URM is also conscious of the need to develop effective and challenging exercises but at a reasonable cost and working to a specific budget.

Cyber Essentials Scheme being Updated on 24 April 2023

Latest update:
24 Jan
2023

On 23 January 2023, NCSC published an updated set of requirements, v.3.1 for the Cyber Essentials scheme which come into force on the 24th April 2023. Our blog provides an overview of the new guidance

Read more
Thumbnail of the Blog Illustration
Information Security
updateD:
23/1/2023
What is ISO 27001?

ISO 27001 is the International Standard for Information Security Management. Effectively, it provides any organisation, irrespective of size or sector, with a framework and an approach to protecting..

Read more
Thumbnail of the Blog Illustration
Information Security
updateD:
23/1/2023
What Are the Critical Steps When Implementing an Effective Information Security Management System?

Having assisted over 350 organisations achieve ISO 27001 certification, we are often asked about what we consider to be the critical steps when implementing an effective information security system.

Read more
Thumbnail of the Blog Illustration
Information Security
updateD:
23/1/2023
Everything You Need to Know About ISO 27001 Certification

ISO 27001 is the International Standard for Information Security Management. As with all ISO standards, it has been developed by a panel of experts from across the globe and provides a specification

Read more
"
Having never gone through the Cyber Essentials Plus process on behalf of a client I was very impressed with how the process went on testing day and I can't wait to take other clients through the process with URM.
contact US

Let us help you

Let us help you in your compliance journey by completing the form and letting us know how we can best support you.