The term “pretexting” indicates the practice of presenting oneself as someone else to obtain private information. Usually, attackers create a fake identity and use it to manipulate the receipt of information. Attackers leveraging this method of social engineering use several identities that they have created during their carrier. The success of the pretexting attack heavily depends on the attacker’s ability of building trust. Most advanced forms of pretexting attacks try to manipulate the victims into performing an action that enables an attacker to discover and exploit a point of failure inside an organization. An attacker can impersonate an external IT services operator to ask internal staff for information that could allow system access within the organization.

We take the security of our clients’ and prospects’ information very seriously. We are here to help with your company data and that includes training your employees on the ever-changing threat landscape of IT. We’d love to guide your employees through cybersecurity awareness training and simulated phishing campaigns. Please call (504) 372-1372 to schedule an appointment today!


Leave a Reply

Your email address will not be published. Required fields are marked *