Security Awareness Presentations

In a Mystery Guest Visit, your organization's physical security is creatively tested by an expert to identify potential security problems and improve security policies.
NFIR beeldmerk kleur
NFIR beeldmerk kleur

Security Awareness Presentations

In a Mystery Guest Visit, your organization's physical security is creatively tested by an expert to identify potential security problems and improve security policies.

Cybersecurity is the order of the day. Organizations are becoming increasingly dependent on their IT infrastructure and thus exposed to various cyber risks on a daily basis. However, cyber risks also play out in the physical world. Thus, malicious parties can enter your office premises and obtain sensitive information during their visit and even cause a cyber incident. In doing so, they use sophisticated social engineering techniques, exploiting vulnerabilities in human behavior. A mystery visit provides a realistic picture of how resilient your organization currently is against this common attack technique.

A mystery guest visit examines the physical security of your organization. This is done creatively. One of our social engineering experts visits your organization without notice to employees. During this visit, he or she pretends to be a customer, employee or an outside service such as a mechanic. It measures the extent to which employees are vigilant when noticing a person they have not seen before. In addition, the security of a facility or system is tested. In this way, potential security problems are identified and the effectiveness of security policies and procedures is assessed.

Prevent financial and reputational damage

During a mystery guest visit, the purpose of the test is always discussed with you, the client. With this goal as a starting point, several research questions are drawn up and answered during the visit. The mystery guest then reports the findings, which are conveniently displayed in a report. This report also provides tailored advice that is consistent with the findings. Listed below are some research questions that may be asked during a mystery guest visit.

  • For example, is it possible to gain access to a building, server room?
  • Can the network and servers be accessed and digital systems broken into?
  • Are critical systems and areas adequately shielded?
  • Are there any areas that should not be entered?
  • Do your employee, security guards know how to act when it comes to persons who do not belong on the premises, are they alert enough?
  • Is it possible to bypass physical security?
  • Are the security mechanisms such as turnstile gate and pass readers working?
  • If a Cleandesk policy is used, is confidential company information removed from desks?
  • Are the computers locked and is there confidential information to be found?
  • Can passwords and login credentials be extracted?
  • Is your trash properly destroyed and what kind of information can be retrieved from the trash?

Our mystery guest visits formulate answers to the above questions, among others. Get in touch with our social engineering account managers and discuss what opportunities are available for your organization. Get in touch with our social engineering account managers and discuss what opportunities are available for your organization.

The results of these studies are often surprisingly effective and almost always successful. During a mystery guest visit a preliminary survey (OSINT) is always performed, mapping the location and capabilities including the devices used. In addition, consider the energy supplier or building managers. During a mystery guest can also leave spyware, malware and/or(hard)ware left behind be left behind. Read more about this in the next section on USB dropping.

Become resilient against the most common technique used by cybercriminals

Become resilient against the most common technique used by cybercriminals

Also check out our other security awareness services