HUMAN SECURITY

Social Engineering

Your employees are your most targeted attack surface. We test how well they recognise and respond to manipulation - across email, phone, SMS, and in-person vectors - so you can build genuine human resilience.

The Human Attack Surface

We test every channel attackers use to manipulate your people

Email Phishing

Credential harvesting, payload delivery, and BEC pretexts targeting individuals or entire departments

PHISHING

Voice (Vishing)

Impersonating IT, executives, or vendors over the phone to extract credentials or authorise actions

VISHING

SMS (Smishing)

Text-based lures exploiting urgency and trust to drive clicks on malicious links

SMISHING

Physical Access

Tailgating, badge cloning, impersonation, and facility infiltration to test in-person controls

PHYSICAL

Campaign Lifecycle

How we design and execute a social engineering engagement

STEP 01

OSINT & Recon

Gather public information about your organisation, employees, and systems

STEP 02

Pretexting

Craft realistic scenarios based on your specific environment and threat landscape

STEP 03

Execution

Launch campaigns with full tracking of opens, clicks, credentials, and access gained

STEP 04

Education

Immediate, constructive feedback and tailored awareness training for those who engaged

What We Test

Specific scenarios designed to evaluate your real-world exposure

Digital Campaigns

Credential harvesting with cloned login portals
Payload delivery via malicious attachments or links
Executive targeting (whaling / BEC simulation)
IT helpdesk impersonation (vishing)
SMS-based lures with tracked landing pages
MFA bypass and consent phishing scenarios

Physical Campaigns

Badge tailgating into secured areas
Impersonation (delivery, maintenance, contractors)
USB drop attacks in common areas
Dumpster diving for sensitive documents
Shoulder surfing and clean desk assessments
Rogue device placement (network implants)

Is This Right for You?

Best for: Any organisation where employees handle sensitive data, financial transactions, or have privileged system access - and where a single compromised user could lead to a significant breach.

Test Your Human Security