Services
Services
SOC & Attestations
SOC & Attestations
Payment Card Assessments
Payment Card Assessments
ISO Certifications
ISO Certifications
Privacy Assessments
Privacy Assessments
Federal Assessments
Federal Assessments
Healthcare Assessments
Healthcare Assessments
Penetration Testing
Penetration Testing
Cybersecurity Assessments
Cybersecurity Assessments
Crypto and Digital Trust
Crypto and Digital Trust
Schellman Training
Schellman Training
ESG & Sustainability
ESG & Sustainability
AI Services
AI Services
Industry Solutions
Industry Solutions
Cloud Computing & Data Centers
Cloud Computing & Data Centers
Financial Services & Fintech
Financial Services & Fintech
Healthcare
Healthcare
Payment Card Processing
Payment Card Processing
US Government
US Government
Higher Education & Research Laboratories
Higher Education & Research Laboratories
About Us
About Us
Leadership Team
Leadership Team
Careers
Careers
Corporate Social Responsibility
Corporate Social Responsibility
Strategic Partnerships
Strategic Partnerships

Social Engineering

E-mail (phishing), voice (vishing), text message (smishing), and/or physical breach attempts of your facilities are campaigns that, in simulating these real-world attack scenarios, can identify personnel training gaps and physical security issues.

Contact a Specialist Read More About Schellman's Approach

What Happens During a Social Engineering Campaign?

Our testers would first perform the necessary research, just as a real attacker would. With that information, they'll work to gain your team's trust and—during the test—manipulate your personnel into granting access to critical data or physical resources. 

A Social Engineering Campaign Can Help You:

https://www.schellman.com/hubfs/social-prepare-for-real-world-attacks.svg

Prepare for Real-World Attacks

Social engineering is the number one source of organizational compromise. Our team creates custom pretexts targeting your employees to see how they will respond when presented with a convincing attack. 

https://www.schellman.com/hubfs/staff-awareness.svg

Raise Security Awareness Among Your Staff

Discover how many of your employees can identify a suspicious or malicious e-mail, phone call, or text message. 

https://www.schellman.com/hubfs/meet-compliance-requirements.png

Validate Your Security Process Implementation

This type of assessment will examine how well your procedures are designed for disclosing information, whether they are strictly followed, and/or if they are sufficient to protect company and client information.

https://www.schellman.com/hubfs/improve-security.png

Improve Your Security Posture

A social engineering campaign can reveal a lot regarding your more unique, less tech-focused aspects of cybersecurity and reduce the risk of these kinds of attacks, increasing your overall security.

Schellman’s Social Engineering Methodology

Phishing, Smishing, Vishing Methodology: These services examine your employees' responses to unsolicited messaging, which could result in unauthorized access to your sensitive data. We’ll begin with passive reconnaissance to generate a list of targets in your organization. From there, an agreed-upon pretext is designed and executed, after which the results will be documented, verified, and assembled into a report.  

Physical Breach Methodology: During this test, we’ll attempt to physically enter your facility as an external attacker, but that will take time and preparation. We’ll begin with passive and active information gathering regarding your environment through methods including, but not limited to Internet research, site observation, and wireless reconnaissance. Using the information we discover, we’ll craft scenarios for social engineering, determine where entry points are, identify internal security mechanisms, and acquire the necessary equipment. When the time arrives, we’ll attempt to gain access to the target location via the designed pretexts, unsecured points of entry, or other non-destructive means of entry before providing you with a deliverable that walks through each aspect of the project.

Is Schellman the Right Firm for You?

Schellman does perform social engineering campaigns—our Penetration Testing Team continues to grow and is currently comprised of individuals from different backgrounds including former developers, system administrators, and lifelong security professionals. Our team is incredibly experienced, and collectively holds the following professional certifications, among others

Frequently Asked Questions

How long will a social engineering campaign take?

What does a social engineering campaign cost at Schellman?

How often should I have a phishing simulation performed?

How do I decide on a specific pretext for my campaign?

What metrics do you record?

What should I do prior to the start of the campaign?

Take the first step in your Social Engineering Campaign

Our team of practice leaders, not sales, are ready to talk and help determine your best next steps.

Start Scoping Your Penetration Test Contact a Specialist