Book FREE Consultation

URM is pleased to provide a FREE 30 minute consultation on Transitioning to ISO 27001:2022 for any UK-based organisation. Once an enquiry form has been submitted, we will be in touch to understand the nature of your enquiry and to book a mutually convenient time for a 30-minute consultation slot with one of URM’s specialists.

Social Engineering Penetration Testing

Employees represent your greatest information and cyber security risk

Social Engineering Penetration Testing

It is generally acknowledged that that employees represent your greatest information and cyber security risk.  Many data breaches are internal rather than external and are caused by employees who have been negligent, careless, or unaware of security policies and Internet-related threats.  One of the biggest threats are social engineering and phishing attacks, i.e., fraudulent attempts by malicious hackers to get users to divulge sensitive information or click on links etc.  Naturally, the potential impact to the organisation of users clicking on unknown links and providing confidential information could be extremely damaging.  In order to establish how susceptible users are to responding to such risks, URM is able to simulate a targeted social engineering attack.  

URM has developed an effective methodology aimed at determining and measuring user awareness and vigilance to phishing attempts and processing of incoming third-party emails.  Working closely with sponsors from your organisation, we will develop micro websites and a campaign of orchestrated emails aimed at inducing users to open the email, click on a link and provide sensitive information e.g., passwords.  When developing the micro websites and emails, URM is highly proficient at imitating the intended email/website and evolving and modifying the campaign as users begin to interact with the emails, looking to exploit a range of human emotions, e.g., fear, greed, urgency, helpfulness and curiosity.  

At the end of the exercise, through the use of our tracking software, we are able to report back on the number of users who potentially exposed the organisation to the risk of a data breach or to malicious software.  Once completed, the results of the exercise can then form a very powerful component of any staff awareness programme. By referring to the actions of personnel from the actual organisation, cyber risk is no longer an abstract term but something users can practically relate to.  Having been involved in numerous social engineering campaigns, URM has found such exercises to be effective in not just raising awareness but in changing behaviour.

Get in touch

Please note, we can only process business email addresses.

Why URM?

Tailored solutions

Every social networking exercise URM conducts is totally tailored to your organisation.  Working with sponsors, we will aim to understand particular concerns, threats or issues and develop fully customised campaigns.  In terms of recipients of emails, this can again be the whole organisation or specific functions or departments.  In addition to cyber-related exercises, URM is also able to develop physical and telephone-based social engineering exercises, e.g., imitating members of the IT Department and asking users to reveal confidential information.

Getting the balance right

Getting the balance right is absolutely central to the success of any social engineering campaign.  For example, when coming up with microsites and emails in a phishing exercise, it is important to produce something which has a similar look and feel whilst including a number of ‘give away’ discrepancies (e.g., domain names, spelling errors) that should be picked up the users.  URM is highly skilled at achieving the optimum balance in this respect.

URM is also conscious of the need to develop effective and challenging exercises but at a reasonable cost and working to a specific budget.

Cyber Essentials FAQ

Pitfalls to Avoid in your Penetration Testing Programme

Published on
22/8/2024

URM’s blog explores common pen testing mistakes & how to avoid them, and simple improvements you can immediately implement to enhance your security posture.

Read more
Thumbnail of the Blog Illustration
Cyber Security
Published on
1/8/2024
10 Most Common Vulnerabilities Found in Pen Tests

URM’s blog outlines the top 10 most common vulnerabilities we identify when conducting pen tests, the associated risks, and how they can be fixed/avoided.

Read more
Thumbnail of the Blog Illustration
Cyber Security
Published on
12/7/2024
Access Control, Administrative Accounts and Password-Based Authentication in the Cyber Essentials SAQ

URM’s blog offers advice on answering questions in the Cyber Essentials SAQ which relate to access control, admin accounts and authentication methods.

Read more
Thumbnail of the Blog Illustration
Cyber Security
Published on
27/6/2024
Getting the Most from Your Pen Tests - During and Afterwards

URM’s blog outlines the key steps you can take during and after a penetration test to improve your organisation’s security posture.

Read more
"
Without URM, Havas People would not of achieved its certification goals.
Director, Havas People
contact US

Let us help you

Let us help you in your compliance journey by completing the form and letting us know how we can best support you.