Every day we receive calls from multiple parties: potential customers, existing customers, suppliers, colleagues, and sometimes from a party we would rather not speak to: cybercriminals. In addition to classic mail phishing, cybercriminals often use voice phishing. In this social engineering attack, the attacker uses the phone to trick victims. A simple phone call can be enough for them to cause a major incident. Our voice phishing actions are a good gauge of your organization’s current level of awareness and create increased resilience against hard-to-recognize form of phishing.

How does voice phishing work?
Why should my organization conduct a voice phishing test?
Voice phishing, relative to other forms of phishing, is very difficult to detect. Through sophisticated tools and techniques, the attacker’s true identity is well concealed. However, it is a common phishing method that puts the attacker in direct contact with humans. After all, this direct contact provides opportunities that attackers can make good use of. In our voice phishing tests, we mimicked social engineering techniques that capitalize on the human ability to obtain confidential data or get employees to perform certain actions. In addition, we will work with you to come up with a role that one of our ethical hackers will take on. The scope is always determined with you. By simulating authentic voice phishing attacks as much as possible, you get a realistic picture of your organization’s current level of awareness. The result of a voice phishing test provides a good basis for taking targeted measures in line with laws and regulations and that match your organization’s pain points. Current AVG laws and regulations require organizations to take appropriate measures to eliminate cyber risks as much as possible.
Become resilient against the most common technique used by cybercriminals
Become resilient against the most common technique used by cybercriminals