We conduct a variety of social engineering “attacks” to simulate real-world intrusion methods and train employees to reduce network risk. Our team developed the Army’s Phishing platform and improved the capabilities to keep pace with the growing threat environment. Since 2010, our team has conducted Phishing attacks targeting in excess of 200,000 users. All social engineering methods are closely coordinated with the customer to ensure no negative impacts on the network.
Methods we might employ under customer control and coordination:
Process: Our Phishing assessment architecture tests and trains employees to avoid the trap set by hackers. We closely coordinate with customer “Trusted Agents” to distribute phishing messages to users, track their actions, provide on the spot training.