Security Awareness Training

Social Engineering Defense

Train, prepare, and protect your team from attacks.
In 2016, 43% of documented breaches involved social engineering tactics

What is Social Engineering?

Social Engineering refers to the psychological manipulation of people, coercing them into performing actions or divulging confidential information. Attacks of this nature continue to be one of the most significant threats to businesses. EDTS Cyber professionals can assess your preparedness to deal with these threats and train your staff on how to avoid common pitfalls.
Social Engineering Techniques and Complex and Always Evolving

Phishing & Spear-Phishing

The attacker masquerades as a credible source, and sends an email requesting an action (ex: click URL, open attachment) or to share confidential information. In spear-phishing, the credible source is a client, vendor contact, or supervisor. See Examples of Phishing & Spear Phishing

Physical or Phone Impersonation

The attacker assumes a false identity to gain access to information, facilities, or secure systems. Can be used in conjunction with phishing so that the end-user expects the phishing email.

USB Baiting

A real-world Trojan Horse technique that uses physical media and relies on the curiosity or goodwill of the victim (ex: attacker leaves a malware-infected USB flash drive or CD in a public location). Merely inserting the media in a computer will unknowingly install malware.

Customized Social Engineering Prevention & Defense

Risk Assessment of Security Awareness


We survey your company and identify key vulnerabilities related to social engineering attacks. Your results are summarized in an executive summary with actionable steps to recovery.

Learn More

Endpoint Monitoring - Data Sentry


A managed security solution that monitors each device in your company to provide critical defense from social engineering attacks

Learn More

Incident Response & Remediation


We contain the aftermath of a successful attack and help your company recover quickly and implement better technology and practices.

Learn More

Security Awareness Training with Simulated Phishing


The most effective way to defend against email social engineering attacks—your employees learn how to recognize the warning signs through easy-to-understand online learning modules.

Learn More

Get Started: Request a Proposal

Request a Demo