The state of being protected against unauthorized access to data the measures taken to achieve this.
Time and time again, industry studies and research into cybersecurity point to one immutable fact: humans are the weak link. Social engineering seeks to exploit the most vulnerable aspect of any organization, the human element, by using a variety of different approaches including email phishing, pre-text calling (vishing), physical entry and USB drops. Workstations and servers can be locked down with security policies and security devices, but, so long as employees are around, the risk of a social engineering incident will remain. Social engineering programs consist of multiple attack vectors that are used to establish a failure benchmark accompanied by security awareness training and subsequent testing to determine the training’s effectiveness.
The Mako Group assists organizations through the entire program development process and can recommend social engineering scenarios, benchmarks and training both observed and utilized throughout the industry.