Engineering Assessment

Though technical threats are often the primary concern of a security audit, many times malicious attackers threaten employees personally, trick them into providing passwords, or installing malware.

This assault – known as social engineering – will range from basic email phishing to complex operations utilizing various contact strategies.

Tektegra provides a variety of expert-driven social innovation commitments to assess both staff preparation and technological controls.

If it's conventional spear phishing (email), vishing (voice calls), or on-site inspection and trying to reach the actual building, we've qualified experts readily available.

Assessment Types

  • Spear phishing (Directed Email Campaigns)
  • Vishing (Incorporating Voice Calls)
  • On-site Engagement (Tailgating, dropping USB drives, etc.)

Phishing in Advanced Campaigns

Often straightforward social engineering commitments are fruitful by deliberately exploiting confidential information or access, but not all attacks are so straightforward. In the case of more advanced commitments, operators can request simple office material, such as the organizational structure or who is on vacation.

This information serves as building blocks for coercing more prepared users, using common experience to gain trust and credibility.

Conducting a social engineering evaluation with Tektegra will identify the risks and effects of social engineering as well as the potential of the organization to respond to such an attack.

Assessment Details and Methodology

At Tektegra, each commitment to social engineering implements a validated approach to ensure strongly focused, reliable commitments. Each engagement shall be carried out in the following steps:

    Information gathering on target organization and personnel
  1. Reconnaissance
  2. The collection of information is a crucial step of social engineering which also influences the progress of the remainder of the evaluation. Using the black box' technique, our intelligence analysts carry out in-depth analysis to collect information from the target organization.

    Create pretext scenarios, preparing for execution
  3. Create Pretext Scenarios and Payloads
  4. If the objective has been thoroughly enumerated, the emphasis is on drawing up the payload. These specifics include the identification of departments, user positions, and the related pretext scenarios. These specifics mean that each customer is carefully researched for the most effective, tailored commitments.

    Engage targets, safely exploiting phishing pages
  5. Engage Targets
  6. Using strategically structured strategies and pretexts, intelligence researchers at Tektegra engage workers by phishing emails or phone calls. For on-site assessments, several experiments are started, such as tailgating users and baiting staff with 'missing' USB drives in the office.

    Detailed, risk- prioritized report with remediation steps
  7. Assessment Reporting and Debrief
  8. After the completion of the initiative and the aggregation of outcomes, a final report shall be submitted, containing both an executive overview and specific information.Remediation measures and training instructions are also given to guide the customer in the resolution of the training and policy problems found.

    (Optional) Social engineering training and education for employees
  9. Employee Education
  10. As an optional extension, Tektegra offers user training workshops for clients' staff. Whether hosted in a filmed online webinar or in-house training session, Tektegra offers premium security awareness training – by the same experts who did the initial work.