Social Engineering

Focal Point offers both physical and electronic social engineering to test the human elements of your security program, evaluating the real-world security of your physical systems and employees.
Electronic Social Engineering

Electronic Social Engineering

An electronic social engineering assessment tests the security awareness of your employees by enticing them to provide access to sensitive information or company resources. Social engineering identifies critical risk factors through different communication scenarios, including email and phone interactions. Our final report provides an outline of your overall security awareness, as well as a detailed technical report including all specific vulnerabilities, severity of exploits, and suggested remediation efforts.

Get in Touch

Different from the Rest

At Focal Point, we take a different approach to managing cyber risk.

Customized Assessment

We don't choose our social engineering strategies from a set list. Our team tailors our approach to your needs, industry, and unique threat landscape to really put your team to the test.

On the Field

Our team is in the field daily researching new testing techniques and identifying changing threats. They bring this experience to your projects, uncovering even the most hard-to-detect vulnerabilities.

Best of Both Worlds

Our team members are equally skilled at physical and electronic social engineering tactics. If needed, they can provide a hybrid assessment, providing a more complete picture of your security posture.
Let's Chat

Ready to Get Started?

Focal Point is excited to take on your biggest data risk challenges. If you'd like to speak to a Focal Point expert or inquire about our services, please fill out the following form.
Physical Social Engineering

Physical Breach Assessment

Physical security is your first line of defense against malicious actors, including disgruntled employees and those engaged in corporate espionage. Our team surveys your physical location, gathering open source intelligence that can be used to profile the target. We then attempt to identify physical vulnerabilities through lock picking, media drops, impersonation, and other control exploits. Our final report provides complete visibility into your physical security, with risk ratings for each vulnerability.

Get in Touch

Featured Insights

Recommended reading for those looking to explore the world of penetration testing.
Clean Desk Policy
Blog

Free Template: Clean Desk Policy

Physical security is a critical and sometimes overlooked aspect of cybersecurity. Security should be looked at as a holistic effort to protect important assets – from employees and hardware to customer data...
Learn More
4 Free Email Templates
Blog

4 Free Cybersecurity Awareness Email Templates

More than 90% of hacking attacks begin with phishing or spear-phishing emails, making it easily one of the top attack vectors for cyber criminals. The first step of cyber awareness is communication...
Learn More
How to Build Obfuscated Macros
Blog

How to Build Obfuscated Macros for your Next Social Engineering Campaign

Attention, pen testers: Are you looking to run a phishing campaign that puts your antivirus software to the test? Then this post is for you. Here, I will guide you through how to build a malicious obfuscated...
Learn More