Social Engineering

Evaluate the security awareness and education of an organization's user population. Using specialized attacks such as "phishing", random phone calls, information gathering, and tailgating, consultants are quickly able to determine where vulnerabilities exist in an organization by exploiting weaknesses in human vulnerabilities.

Request a Consultation

Email Phishing

Exchanges of sensitive information over email happen almost constantly, day in and day out. Yet, nearly all of these exchanges don’t go through the proper channels for authentication and authorization. Rhymetec uses email phishing and spear phishing social engineering to target staff into visiting unknown websites, divulging sensitive information or getting them to perform an action they otherwise should not be.

Telephone & SMS

Much like email, exchanges of sensitive information over the phone happen at an almost constant rate. These days, the mindset that a telephone call is enough to authenticate a person is all too common. However, bad actors are moving away from email toward telephone social engineering. Rhymetec uses telephone social engineering to target staff into divulging sensitive information or otherwise getting them to perform an action they should not be.

Rhymetec offers four core Social Engineering areas to test human susceptibility to persuasion and manipulation:


Requests for information via fax is a crucial of exchanging information and sometimes these faxes contain sensitive information. Too often these exchanges of information happen without fully authenticating or authorizing the requesting party. Fax social engineering aims to identify weaknesses in how faxes are managed and exchanged within an organization


During a physical social engineering engagement, Rhymetec engages staff directly (overt) or indirectly (covert) in an effort to identify weaknesses in the way they physically handle visitors and those pretending to be employees, vendors or business partners. Rhymetec consultants masquerade as vendors, new employees, business partners and even employee family members in order to entice staff into divulging sensitive information or permitting access to sensitive areas of the facility.

© 2018 Rhymetec LLC - All Rights Reserved