” Break-in to order” – trying to break into a company and install keyloggers or other spying devices, exfiltrate data, or even just distribute USB sticks or take evidence photos: this is Physical Social Engineering.
The attacker can, for example, act like an employee of the company and try to enter the office premises without access authorisation. In other scenarios, the attacker pretends to be a courier or a telecom employee – there are no limits to the imagination.
Usually, several scenarios are prepared and carried out, if necessary also at different locations.
The individual trials are documented and summarised in a report with an assessment of the situation and recommendations.
Contact us for details and a quote!