Social engineering and phishing exercises reduce the risks posed by adversaries who bypass technical safeguards by targeting people instead of systems. DotSec’s assessments show how your staff respond to realistic threats such as phishing, smishing and vishing, and whether your controls and awareness programs perform as expected.
We design tailored campaigns that reflect current attacker techniques, including MFA-resistant phishing, and we measure real behaviours such as link-clicks, credential submission, reporting rates and authentication failures. As a result, you receive a clear, evidence-based view of your organisation’s resilience, along with guidance to improve training, processes and controls.
Social engineering is the modern word for an old concept: a con. Attackers target broad groups or specific individuals and try to trick the victim into revealing information, granting access, approving transactions or taking an action that benefits the attacker.
A social engineering test helps users remember their role in protecting the organisation and verifies the effectiveness of controls such as security-awareness training and incident reporting.
DotSec’s tests mimic real attacker behaviour, potentially including:
Social engineering tests benefit your business in many ways:
Tests also support compliance with ISO/IEC 27001, PCI DSS and the Australian Information Security Manual by demonstrating that personnel awareness and response capability are monitored and improved.
We’ll use phishing tests as the example social engineering exercise here but the processes for other social engineering tests (smishing, vishing, etc.) are all similar, with minor changes to delivery mechanisms and associated details.
Whichever social engineering test you choose, dotSec handles the technical and content side of the phishing exercise. You just provide a little help to make sure the test lands properly and delivers meaningful results.
We’ll begin with a short scoping session to understand your environment, training goals and user base.
If you already run security-awareness training, we’ll align our phishing content so it reinforces what your staff have learned.
We’ll also review your MFA setup to understand what an attacker would need to do to bypass it. These are the same techniques used in real-world breaches, and simulating them gives you a much clearer view of your actual exposure.
Our phishing templates are never random. We select or customise each one to match your organisation, industry and threat profile.
The final templates, agreed with you in advance, may include fake HR announcements, supplier-themed messages or login pages that closely mimic your real authentication flow.
To make sure the test is effective, we will work with you to:
This part of the process is not difficult and normally takes no more than a few hours of your time, spread over a day or two.
You can choose to run phishing tests across your whole organisation at once or spread them over several days. We can run them quietly or alongside internal communications, depending on how visible you want the program to be.
Each test may capture and report on:
The report will usually be provided as a PDF document, along with any supporting material that may be required.
After each test, we provide a clear report that summarises the results, identifies trends and recommends next steps. We then hold one or more follow-up meetings with your team to:
These meetings are run by DotSec’s assessors, the same people who designed and analysed your test.
As a result, you speak directly with the people who understand the details, rather than a sales or account manager.
A bad day phishing is better than a good day in the office! Let’s work together to see if users will click a suspicious link, but let’s also go further and run MFA-resistant phishing exercises, simulating phishing attacks that are (generally) capable of bypassing multi-factor authentication (MFA) protections.
We’ll utilise techniques that includes things like fake login portals that harvest session cookies, or simulated push-notification fatigue attacks that trick users into approving malicious sign-in attempts, techniques that mirror those used in real-world incidents.
Let’s go phishing!
Practical and experienced Australian ISO 27001 and ISMS consulting services. We will help you to establish, implement and maintain an effective information security management system (ISMS).
DotSec’s penetration tests are conducted by experienced, Australian testers who understand real-world attacks and secure-system development. Clear, actionable recommendations, every time.
dotSec stands out among other PCI DSS companies in Australia: We are not only a PCI QSA company, we are a PCI DSS-compliant service provider so we have first-hand compliance experience.
Web Application Firewalls (WAFs) are critical for protecting web applications and services, by inspecting and filtering out malicious requests before they reach your web servers
Multi-Factor Authentication (MFA) and Single Sign-On (SSO) reduce password risks, simplify access, letting verified and authorised users reach sensitive systems, services and apps.
dotSec provides comprehensive vulnerability management services. As part of this service, we analyse findings in the context of your specific environment, priorities and threat landscape.
We don’t just test whether users will click a suspicious link — we also run exercises, simulating phishing attacks that are capable of bypassing multi-factor authentication (MFA) protections.
DotSec’s penetration testing services help you identify and reduce technical security risks across your applications, cloud services and internal networks. Clear, actionable recommendations, every time!
dotSec has provided Australian managed SOC, SIEM and EDR services for 15 years. PCI DSS-compliant and ISO 27001-certified. Advanced log analytics, threat detection and expert investigation services.
We provide prioritised, practical guidance on how to implement secure configurations properly. Choose from automated deployment via Intune for Windows, Ansible for Linux or Cloud Formation for AWS.
Secure web hosting is fundamental to protecting online assets and customer data. We have over a decade of AWS experience providing highly secure, scalable, and reliable cloud infrastructure.
DotSec helps organisations to benefit from the ACSC Essential Eight by assessing maturity levels, applying practical security controls, assessing compliance, and improving resilience against attacks.
Evaluation against the CIS 18 Controls establishes a clear baseline for stakeholders, supporting evidence-based planning, budgeting, maturity-improvement and compliance decisions
We have over 25 years of cyber security experience, providing practical risk-based guidance, advisory and CISO services to a wide range of public and private organisations across Australia.