Security Awareness Training

Social Engineering Defense

Train, prepare, and protect your team from attacks.
43%
In 2016, 43% of documented breaches involved social engineering tactics

What is Social Engineering?


Social Engineering refers to the psychological manipulation of people, coercing them into performing actions or divulging confidential information. Attacks of this nature continue to be one of the most significant threats to businesses. EDTS Cyber professionals can assess your preparedness to deal with these threats and train your staff on how to avoid common pitfalls.
Social Engineering Techniques and Complex and Always Evolving

Phishing & Spear-Phishing

The attacker masquerades as a credible source, and sends an email requesting an action (ex: click URL, open attachment) or to share confidential information. In spear-phishing, the credible source is a client, vendor contact, or supervisor. See Examples of Phishing & Spear Phishing
image.png
image-1.png

Physical or Phone Impersonation

The attacker assumes a false identity to gain access to information, facilities, or secure systems. Can be used in conjunction with phishing so that the end-user expects the phishing email.

USB Baiting

A real-world Trojan Horse technique that uses physical media and relies on the curiosity or goodwill of the victim (ex: attacker leaves a malware-infected USB flash drive or CD in a public location). Merely inserting the media in a computer will unknowingly install malware.
image.png

Customized Social Engineering Prevention & Defense

Risk Assessment of Security Awareness

Arrow

We survey your company and identify key vulnerabilities related to social engineering attacks. Your results are summarized in an executive summary with actionable steps to recovery.

Learn More

Endpoint Monitoring - Data Sentry

Arrow

A managed security solution that monitors each device in your company to provide critical defense from social engineering attacks

Learn More

Incident Response & Remediation

Arrow

We contain the aftermath of a successful attack and help your company recover quickly and implement better technology and practices.

Learn More

Security Awareness Training with Simulated Phishing

Arrow

The most effective way to defend against email social engineering attacks—your employees learn how to recognize the warning signs through easy-to-understand online learning modules.

Learn More

Get Started: Request a Proposal

Request a Demo