{"id":5519,"date":"2021-09-07T17:04:19","date_gmt":"2021-09-07T17:04:19","guid":{"rendered":"https:\/\/datasecc.com\/?page_id=5519"},"modified":"2021-09-07T17:33:21","modified_gmt":"2021-09-07T17:33:21","slug":"social-engineering-phishing","status":"publish","type":"page","link":"https:\/\/datasecc.com\/?page_id=5519","title":{"rendered":"Social Engineering Phishing"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"5519\" class=\"elementor elementor-5519\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-281d4548 elementor-section-content-middle ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"281d4548\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-28325077 ot-flex-column-vertical\" data-id=\"28325077\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7993c0d elementor-widget elementor-widget-iheading\" data-id=\"7993c0d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/<\/span>\r\n\t        <h2 class=\"main-heading\">SOCIAL ENGINEERING, PHYSICAL INTRUSION & PHISHING HIGHLIGHT GAPS IN USER SECURITY <br>\n<br>\n90% of Security Attacks are Due to Human Error<\/h2>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-69008b8 elementor-widget elementor-widget-text-editor\" data-id=\"69008b8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><p>It\u2019s a known fact that users are the weakest link in securing your organization. Without knowing what to look for and how to protect against social engineering attacks, your users might end up being used to compromise your organization. Social Engineering and Physical Intrusion testing aims to highlight gaps in your users\u2019 resilience against such attacks, performing the same attacks that are likely to allow attackers in.<\/p><p>To minimize your users potentially compromising organizational security, we provide the following services:<\/p><ul><li>Email phishing: Users will be sent an email containing misleading information tempting them into running potentially malicious software.<\/li><li>Phone: A social engineering specialist will call multiple users and attempt to gain information, passwords and access to the user system.<\/li><li>USB Drop: A social engineering specialist will leave a number of USB sticks on customer premises containing specialized software. This software will alert DataSecure if the USB is inserted into a system and run.<\/li><li>Physical Intrusion: Security consultants will attempt to break into a customer location through tailgating, social engineering, and manipulation of access control systems.<\/li><\/ul><p>Our social engineering can fully support Information Security Awareness Training by providing a base to work on and by\u00a0validating\u00a0that the training is effective.<\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-7593574 ot-column-items-top ot-flex-column-vertical\" data-id=\"7593574\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-297bd1c5 elementor-widget elementor-widget-image\" data-id=\"297bd1c5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"618\" height=\"531\" src=\"https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/InfoGrapicBlog.jpg\" class=\"attachment-large size-large wp-image-2280\" alt=\"\" srcset=\"https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/InfoGrapicBlog.jpg 618w, https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/InfoGrapicBlog-300x258.jpg 300w\" sizes=\"(max-width: 618px) 100vw, 618px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\/\/ SOCIAL ENGINEERING, PHYSICAL INTRUSION &#038; PHISHING HIGHLIGHT GAPS IN USER SECURITY 90% of Security Attacks are Due to Human Error It\u2019s a known fact that users are the weakest link in securing your organization. Without knowing what to look for and how to protect against social engineering attacks, your users might end up being [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-5519","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5519","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/datasecc.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5519"}],"version-history":[{"count":10,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5519\/revisions"}],"predecessor-version":[{"id":5530,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5519\/revisions\/5530"}],"wp:attachment":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5519"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}