In 2019, Test Impersonation Attacks

In 2019, Test Impersonation Attacks

At SECOM, we perform many forms of social engineering attacks, from phishing to vishing and smishing as well as impersonation. All of these attacks are used regularly by actual attackers and should be tested as part of a robust security assessment in every organization. Small and large businesses alike are ... Read More
Are All Social Engineers Bad?

Are All Social Engineers Bad?

When you think about what a social engineer does, and how influence and manipulation are used by good and bad SEs, it is easy think that to be an SE you need to have an evil personality or even have sociopathic tendencies. Is that true, are all social engineers bad? ... Read More
Protect Yourself Against Social Engineering in the Age of Cryptocurrency

Protect Yourself Against Social Engineering in the Age of Cryptocurrency

“Bitcoin,” “Litecoin,” “Ethereum,” and “cryptocurrency” have rapidly become household names, though many households don’t have a firm understanding of the technology behind cryptocurrencies and the blockchain. To be fair, this lack of understanding extends to many professionals in the information technology and information security space, as well as professionals in ... Read More
picture1

The Equifax Breach And What You Need To Know

It seems like a day doesn’t go by without another “breach” story in the news. So much that you might find yourself ignoring them as just another news story. But we urge you NOT to ignore this one. Please. Equifax was breached in May 2017. It looks like hackers used ... Read More