Social Engineering with
Physical & Logical Attack

Intelligence Operation
of Social Engineering

LGMS Security Team will approach the Social Engineering assessment as an intelligence operation. During the course of assessment, LGMS Security Team will base on clear objectives to breach the security controls using information that has been obtained through deception including phishing emails, sending of malicious parcels (CD or thumb-drives), and social engineering phone calls. In order to obtain the best results, LGMS Security Team will only use information that can be obtained either through public information or by any means of deception techniques.

Contact Us Now