Demo Free trial Request quote Contact me

Social engineering

Attacks by e-mail is getting increasingly more advanced

Social engineering entail methods to manipulate people to disclose confidential information or perform actions, rather than commit break-in or use more technical hacker methods. Social engineering often occurs over email, and it is technically difficult to protect oneself against, as attacks are getting increasingly more advanced. Since no spam filter can provide a complete protection, the best protection towards these attacks is user resilience, through continuous simulations and customisable education and awareness information.


Ransomware-attacks is one of our times greatest security threats. These attacks often start with an email, tricking users to install a dangerous code (virus). The ransomware starts to spread in the network, infecting unit after unit, from computers to servers. The content of the units is encrypted and often a ransom is demanded to decrypt the units. Ransomware does not only effect production, for examples in factories, but can halt whole operations, when networks and computers need to be shut down.


Phishing-attacks often target users to leave out sensitive information, such as banking information, credit card information, business secrets, email logging information, or information for other sensitive systems. By getting hold of credentials, criminals can gain more e-mail accounts to perform attacks from.

Spear phishing

The openness of the internet allow increasingly more advanced spear-phishing attacks to be executed. Criminals can manually or with the help of programs, easily find out, for example, who the CEO or CFO of your organization is. By fronting as a known person, different methods can be used to get a hold of sensitive information, or get a person to perform detrimental acts.

Leakage of personal data

Social engineering can be used to make users leak personal data, in breach of GDPR. This often occurs through so called spear phishing, for example it could be when the criminal poses as the CEO asking for a list of all the employees.

Leakage of business secrets

Social engineering is increasingly often used to get a hold of business secrets. This is often done through spear phishing. For example, a criminal posing as the CEO, asking the CFO for the latest yearly report. For a listed company this kind of leakage of non-public economical information can result in catastrophic consequences.

Our solution

With our solution, Fraud Risk Assessment, you can simulate different types of social engineering, such as email-attacks, in order to understand user behaviour, as well as educate users to become more resilient through education- and awareness information.

Protect users from social engineering, such as ransomware, phishing and spear phishing
Fraud Risk Assessment 
With Fraud Risk Assessment, you can simulate email attacks and based on the data collected, educate the users to improve resilience towards these types of attacks.
Perform continuous work to keep users informed about the latest threats.
Fraud Risk Assessment 
With our service Fraud Risk Assessment, you can, with very simple means, continuously perform simulations (for example, 4 times per year) and let users customize education- and awareness information.
Ensure that the right users get the right information.
Fraud Risk Assessment 
With our product Fraud Risk Assessment, educational- and awareness information is automatically sent to your users, based on their engagement in the simulation. This without you knowing which users did what.  
Measure that users get more resilient over time.
Fraud Risk Assessment 
With our service, Fraud Risk Assessment you can compare different simulations to spot trends.