Social Engineering
cyber security circuit board
Social Engineering

Social Engineering is a collection of techniques used to manipulate people into performing certain actions or divulging confidential information to break normal security procedures. While similar to a confidence trick or simple fraud, the term typically applies to trickery for information gathering or computer system access, and in most (but not all) cases, the attacker never comes face-to-face with the victim.

security threat hook

Above Security was recognized by CIO Review Magazine as one the of the “50 Most Promising IT Services Companies 2014″. Click here to read the article.

security for it and business computer systems

Objectives and Methodology  

Above Security’s Social Engineering service allows you to detect weaknesses to better address your staff-related security issues. An additional objective of a Social Engineering mandate is to establish solutions to increase the global level of your corporate data confidentiality, integrity and availability.

Above Security proposes a method to acquire access privileges to an organization or to obtain sensitive information about its assets by questioning its personnel by means of phone calls, emails, chat or technical forums.

Sample Scenario

  • Above Security chooses a person based on the already acquired information concerning the personnel
  • We examine possible means of communication with this individual
  • We determine habits and priorities of the individual
  • We communicate with the individual and ask for information by acting as a person of authority with privileges
  • We collect the information
  • We list the level of privileged information acquired

Talk To An IT Security Expert

Contact Us

Read Our Security Case Studies

Case Studies

Download Our Services Whitepapers

Download Whitepaper