Social Engineering Services


Providing you with a suite of security services from email phishing, to pretexting, to security seminars!

Social Engineering Services

Social engineering network intrusions rely heavily on human interaction. Your organization’s employees may be unknowingly breaking normal security procedures by providing sensitive data to a hacker. In today’s evolving and ever-changing technology landscape, it can be difficult to navigate and uncover all the different types of social engineering. Mercury Z’s social engineering services can test and assess your organization’s employee security awareness and compliance. Mercury Z then provides a report on the findings so that your organization can take steps to improve security through education and training.

Email Phishing Services

Mercury Z provides you with an email phishing service whereby a prepared email is sent to employees to test their awareness and reactions in an attempt to gain privileged information from them. Hackers typically achieve this by pretending to be a trustworthy entity, and using misleading emails or hypertext that links to a false website.

The Mercury Z Process:

  • Consultation – working with Mercury Z to determine the ‘targets’ (departments, employees, executives, etc.)
  • Create the email – agree on the content and layout of the email to be sent
  • Create authentication server – a custom webpage is prepared to collect all of the responses to the email
  • Send the email – the prepared email is sent and the server then captures actions and credentials as provided
  • Delivery of report and follow-up discussion – a report of the number of responses and the information they contained is compiled by Mercury Z and then presented to the client. Through a consultative process, Mercury Z discusses the issues presented in the report and makes suggestions for improving security. Typically, a security seminar for training and further education is highly recommended

Pretexting Services

Pretexting is a king of social engineering whereby a hacker uses non-technical methods to manipulate an employee into providing secure credentials. This is typically done by creating a scenario where the hacker pretends to be in a position of authority and attempts to trick an employee into providing confidential information. To combat this risk, Mercury Z provides a Pretexting service that establishes a scenario to test employees. This allows you to better assess your organization’s exposure to this kind of risk, as well as educating employees into adopting a more risk-aware mindset.

The Mercury Z Process:

  • Mercury Z consults with you to discuss specific areas to target, such as finance, operations, and HR
  • The Mercury Z Consultant will learn about your business and information freely available in the public domain, which will be used to develop a call scenario to attempt to obtain privileged information
  • Following the completion of the Pretexting service, you will be sent a report detailing those who have failed the test and the ID/PWD combinations that were given

Tailgating Service

‘Tailgating’ is when someone gains unauthorized entry by ‘tagging’ along behind someone who is authorized. One of our consultants will test the security precautions of your company by attempting to gain unauthorized entry. Mercury Z will then make recommendations as to how to improve your security measures, which may include better policies, training, or security equipment, among others.

Security Seminar

Through a customized course on security, Mercury Z can create a seminar that focuses on your organization’s needs. This can be educational for all employees, or specifically catered towards executives through a separate class. We can cover a variety of topics, including phishing or pretexting, among many others.

Mercury Z’s seminar can be delivered on-site with a session in the morning, and another in the afternoon. The Mercury Z Security Consultant delivering the seminar will be available between sessions to answer any general security questions. A video of the seminar can be recorded and customized with the corporate logo and an executive introduction. This can be used to facilitate remote worker training, new hire, and future training/refresher purposes.

Learn More About Social Engineering Security Services!



--
Social-Engineering-Services
Social-Engineering

Get in Touch!

Telephone: (919) 439-5000
Email: info@mercuryz.com
www.mercuryz.com
1150 SE Maynard Rd
Cary, NC 27511

facebook linkedIn facebook

redlogo100