Social Engineering Services
URM has developed an effective methodology aimed at determining and measuring user awareness and vigilance to phishing attempts and processing of incoming third-party emails. Working closely with sponsors from your organisation, we will develop micro websites and a campaign of orchestrated emails aimed at inducing users to open the email, click on a link and provide sensitive information e.g., passwords. When developing the micro websites and emails, URM is highly proficient at imitating the intended email/website and evolving and modifying the campaign as users begin to interact with the emails, looking to exploit a range of human emotions, e.g., fear, greed, urgency, helpfulness and curiosity.
At the end of the exercise, through the use of our tracking software, we are able to report back on the number of users who potentially exposed the organisation to the risk of a data breach or to malicious software. Once completed, the results of the exercise can then form a very powerful component of any staff awareness programme. By referring to the actions of personnel from the actual organisation, cyber risk is no longer an abstract term but something users can practically relate to. Having been involved in numerous social engineering campaigns, URM has found such exercises to be effective in not just raising awareness but in changing behaviour.
Get in touch
Please note, we can only process business email addresses.
Why URM?
Tailored solutions
Every social networking exercise URM conducts is totally tailored to your organisation. Working with sponsors, we will aim to understand particular concerns, threats or issues and develop fully customised campaigns. In terms of recipients of emails, this can again be the whole organisation or specific functions or departments. In addition to cyber-related exercises, URM is also able to develop physical and telephone-based social engineering exercises, e.g., imitating members of the IT Department and asking users to reveal confidential information.
Getting the balance right
Getting the balance right is absolutely central to the success of any social engineering campaign. For example, when coming up with microsites and emails in a phishing exercise, it is important to produce something which has a similar look and feel whilst including a number of ‘give away’ discrepancies (e.g., domain names, spelling errors) that should be picked up the users. URM is highly skilled at achieving the optimum balance in this respect.
URM is also conscious of the need to develop effective and challenging exercises but at a reasonable cost and working to a specific budget.
Cyber Essentials – What’s Changing in 2025?
URM’s blog discusses upcoming changes to Cyber Essentials, including the changes seen in the Willow Question Set and how they may impact your organisation.
URM’s blog discusses the security risks associated with the software supply chain & how both software developers and their clients can mitigate these risks.
URM’s blog explores common pen testing mistakes & how to avoid them, and simple improvements you can immediately implement to enhance your security posture.
URM’s blog outlines the top 10 most common vulnerabilities we identify when conducting pen tests, the associated risks, and how they can be fixed/avoided.