On this page

    Service Overview

    DeepSeas' Telephone Vishing service provides organizations with simulated real-world attack scenarios to identify gaps in security awareness and personnel responsiveness without the actual consequences of a social engineering attack. During these simulations, results are gathered and compiled into actionable reports that assess the organization's vulnerability to modern-day social engineering tactics and their potential business impact. This service not only provides crucial insights into employees' security posture but also helps organizations determine where to allocate resources and enhance their overall security measures. The value of Telephone Vishing Simulations includes employee training and increased vigilance, offering employees practical experience in recognizing and responding to real threats, thereby improving their discernment skills more effectively than theoretical training. These simulations also reveal weak points in current protocols and employee responses, guiding targeted improvements in training and systems. Moreover, they serve as a cost-effective preventive measure against financial and reputational damage from potential breaches, while also strengthening incident response capabilities by educating employees on the importance and procedures for reporting incidents, thus enhancing overall organizational response to real threats.

    Methodology

    1. Scoping/Pre-engagement - This foundational phase involves identifying and gathering essential details such as test window, test dates, names, and phone numbers to establish the rules of engagement crucial for the assessment's success.
    2. Information Gathering - Through techniques like Google Hacking and LinkedIn scraping, this phase collects open-source intelligence (OSINT) about the targets, which aids in developing realistic pretext scenarios for the next phase.
    3. Pretext and Exploitation - DeepSeas consultants craft and employ convincing pretexts to simulate telephone-based social engineering attacks, persuading targets to divulge sensitive information or perform actions contrary to best security practices.
    4. Vulnerability Analysis - This phase documents and analyzes vulnerabilities exposed during the simulation, comparing findings against organizational policies and security practices to assess the efficacy of current security measures.
    5. Risk Determination - Based on the vulnerabilities identified and factors like organizational size, industry, and security posture, this step evaluates the risks associated with each vulnerability, aiding in prioritization for remediation.
    6. Reporting - The final phase delivers a comprehensive electronic report detailing the security controls' current state, including risk ratings, findings, recommendations, and supporting evidence. This report highlights areas needing improvement to enhance the organization's overall security.