{"id":252388,"date":"2025-05-18T23:48:46","date_gmt":"2025-05-18T21:48:46","guid":{"rendered":"https:\/\/cyberforces.com\/?page_id=252388"},"modified":"2025-06-01T01:25:57","modified_gmt":"2025-05-31T23:25:57","slug":"social-engineering","status":"publish","type":"page","link":"https:\/\/cyberforces.com\/en\/social-engineering","title":{"rendered":"Social Engineering"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_direction=&#8221;45deg&#8221; background_color_gradient_stops=&#8221;#b01e30 0%|#151c4b 100%&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; module_class=&#8221;cf_hero_section_mobile&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; width=&#8221;100%&#8221; width_tablet=&#8221;90%&#8221; width_phone=&#8221;90%&#8221; width_last_edited=&#8221;on|tablet&#8221; custom_padding=&#8221;48px||48px|48px|true|false&#8221; custom_padding_tablet=&#8221;48px||48px|48px|true|false&#8221; custom_padding_phone=&#8221;48px|24px|48px|24px|true|false&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#151C4B&#8221; header_font_size=&#8221;3em&#8221; header_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_color=&#8221;#151C4B&#8221; header_3_text_align=&#8221;center&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1 class=\"n-heading-primary u-mb-small\">Social Engineering<\/h1>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#B01E30&#8243; divider_weight=&#8221;5px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;25%&#8221; module_alignment=&#8221;left&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_4_font=&#8221;Raleway|500|||||||&#8221; header_4_text_color=&#8221;#485060&#8243; header_4_font_size=&#8221;1.2em&#8221; header_4_line_height=&#8221;1.4em&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4>No&nbsp;matter how sophisticated, modern and impenetrable your security system may be, remember that it is only as&nbsp;strong as&nbsp;its weakest link \u2013 which is usually a&nbsp;human. If an employee accidentally plugs a&nbsp;malware-infected USB drive into a&nbsp;company computer, don\u2019t be&nbsp;surprised if a&nbsp;hacker has already infiltrated your internal network. Of course, we&nbsp;can anticipate which technical flaws might be&nbsp;found in&nbsp;the system and what tools an attacker would use to&nbsp;uncover them, but can we&nbsp;foresee the behaviour of an employee who falls victim to&nbsp;a&nbsp;clever manipulation?<\/h4>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/cyberforces.com\/wp-content\/uploads\/sociotechnology.webp&#8221; title_text=&#8221;sociotechnology&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;80%&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#EDF2FA&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; da_disable_devices=&#8221;off|off|off&#8221; border_radii=&#8221;off||||&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; width=&#8221;100%&#8221; width_tablet=&#8221;90%&#8221; width_phone=&#8221;90%&#8221; width_last_edited=&#8221;on|tablet&#8221; custom_padding=&#8221;|48px||48px|false|true&#8221; custom_padding_tablet=&#8221;|48px||48px|false|true&#8221; custom_padding_phone=&#8221;|24px||24px|false|false&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;10px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_color=&#8221;#151C4B&#8221; header_3_text_align=&#8221;center&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 style=\"text-align: center;\">What is Social Engineering?<\/h2>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#B01E30&#8243; divider_weight=&#8221;5px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;10%&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Nunito Sans|&#8211;et_global_body_font_weight|||||||&#8221; text_text_color=&#8221;#485060&#8243; text_font_size=&#8221;1.2em&#8221; header_2_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; header_2_text_color=&#8221;#151C4B&#8221; header_3_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; header_3_text_color=&#8221;#151C4B&#8221; header_4_text_color=&#8221;#151C4B&#8221; header_4_font_size=&#8221;1em&#8221; header_4_line_height=&#8221;1.2em&#8221; custom_margin=&#8221;||5px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Social Engineering tests are <strong>controlled, simulated attacks<\/strong> that allow you to&nbsp;check the alertness of your employees and the effectiveness of your security procedures. In&nbsp;such a&nbsp;test, CyberForces specialists attempt to&nbsp;deceive your staff in&nbsp;various ways \u2013 via fake emails, phone calls, SMS messages, and even by&nbsp;trying to&nbsp;physically enter your office. The goal is to&nbsp;verify whether your personnel can recognise a&nbsp;threat and respond appropriately. Ask yourself: do&nbsp;you train your employees to&nbsp;defend against attacks aimed at&nbsp;manipulating them psychologically? Do&nbsp;they know how to&nbsp;safely verify suspicious links and attachments? Are they aware of the techniques cybercriminals use to&nbsp;conceal their true intentions?<\/p>\n<p>Nowadays, social engineering attacks are the simplest and most effective way to&nbsp;bypass even advanced technical security measures. Their power lies in&nbsp;the fact that they often do&nbsp;not arouse the victim\u2019s suspicion until it\u2019s too late. To&nbsp;accurately assess your organisation\u2019s resilience to&nbsp;such threats, social engineering tests cover as&nbsp;many attack vectors as&nbsp;possible. Our specialists use publicly available information (OSINT), along with their knowledge and creativity, to&nbsp;simulate cybercriminal tactics as&nbsp;realistically as&nbsp;possible. Thanks to&nbsp;this approach, the tests remain unpredictable and provide reliable data about vulnerabilities in&nbsp;the human link of your security chain.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Section&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#151C4B&#8221; custom_padding=&#8221;20px||||false|false&#8221; da_disable_devices=&#8221;off|off|off&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; header_3_text_align=&#8221;center&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 style=\"text-align: center;\">How can your organisation benefit from Social Engineering Tests?<\/h2>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#B01E30&#8243; divider_weight=&#8221;5px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;10%&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||10px||false|false&#8221; animation_style=&#8221;fade&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; custom_css_main_element_last_edited=&#8221;on|phone&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; custom_padding=&#8221;24px|24px|24px|24px|true|false&#8221; custom_css_main_element=&#8221;||||||&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;10px&#8221; global_colors_info=&#8221;{}&#8221; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; header_2_text_color=&#8221;#151C4B&#8221; header_3_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; header_3_text_color=&#8221;#151C4B&#8221; custom_margin=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div style=\"display: flex; justify-content: space-between; align-items: center;\">\n<div>\n<h3 class=\"n-heading-secondary u-mb-small\">Clear measure of your staff\u2019s security awareness<\/h3>\n<\/div>\n<div><img decoding=\"async\" style=\"max-width: 80px; vertical-align: middle;\" src=\"https:\/\/cyberforces.com\/wp-content\/uploads\/cyberawareness_2.webp;\" \/><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#B01E30&#8243; divider_weight=&#8221;5px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;25%&#8221; module_alignment=&#8221;left&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#151C4B&#8221; text_font_size=&#8221;1.2em&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>You gain a&nbsp;clear picture of how well employees actually follow security protocols and recognize attacks, rather than relying on&nbsp;assumptions or&nbsp;training alone. This insight allows you to&nbsp;better target future training efforts.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; custom_padding=&#8221;24px|24px|24px|24px|true|false&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;10px&#8221; global_colors_info=&#8221;{}&#8221; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; header_2_text_color=&#8221;#151C4B&#8221; header_3_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; header_3_text_color=&#8221;#151C4B&#8221; custom_margin=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div style=\"column-gap: 1em; display: flex; justify-content: space-between; align-items: center;\">\n<div>\n<h3 class=\"n-heading-secondary u-mb-small\">Identify weak points before attackers do<\/h3>\n<\/div>\n<div><img decoding=\"async\" style=\"max-width: 80px; vertical-align: middle;\" src=\"https:\/\/cyberforces.com\/wp-content\/uploads\/critical_threat.webp;\" \/><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#B01E30&#8243; divider_weight=&#8221;5px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;25%&#8221; module_alignment=&#8221;left&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#151C4B&#8221; text_font_size=&#8221;1.2em&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>The tests will highlight specific weak spots \u2013 be&nbsp;it lack of vigilance, weak passwords, or&nbsp;bypassed procedures \u2013 that could normally be&nbsp;exploited by&nbsp;a&nbsp;real attacker. This way, you can close those gaps before a&nbsp;real incident occurs.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||10px||false|false&#8221; animation_style=&#8221;fade&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; custom_css_main_element_last_edited=&#8221;on|phone&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; custom_padding=&#8221;24px|24px|24px|24px|true|false&#8221; custom_css_main_element=&#8221;||||||&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;10px&#8221; global_colors_info=&#8221;{}&#8221; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; header_2_text_color=&#8221;#151C4B&#8221; header_3_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; header_3_text_color=&#8221;#151C4B&#8221; custom_margin=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div style=\"display: flex; justify-content: space-between; align-items: center;\">\n<div>\n<h3 class=\"n-heading-secondary u-mb-small\">Heightened employee awareness<\/h3>\n<\/div>\n<div><img decoding=\"async\" style=\"max-width: 80px; vertical-align: middle;\" src=\"https:\/\/cyberforces.com\/wp-content\/uploads\/awareness.webp;\" \/><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#B01E30&#8243; divider_weight=&#8221;5px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;25%&#8221; module_alignment=&#8221;left&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#151C4B&#8221; text_font_size=&#8221;1.2em&#8221; global_colors_info=&#8221;{}&#8221;]Sam udzia\u0142 firmy w\u00a0takich testach zwi\u0119ksza czujno\u015b\u0107 zespo\u0142u. Pracownicy, kt\u00f3rzy\u00a0zetkn\u0105 si\u0119 z\u00a0kontrolowanym atakiem, lepiej zrozumiej\u0105 zagro\u017cenia i\u00a0stan\u0105 si\u0119 bardziej ostro\u017cni. Pomaga to\u00a0budowa\u0107 kultur\u0119 bezpiecze\u0144stwa w\u00a0organizacji.[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; custom_padding=&#8221;24px|24px|24px|24px|true|false&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;10px&#8221; global_colors_info=&#8221;{}&#8221; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; header_2_text_color=&#8221;#151C4B&#8221; header_3_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; header_3_text_color=&#8221;#151C4B&#8221; custom_margin=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div style=\"display: flex; justify-content: space-between; align-items: center;\">\n<div>\n<h3 class=\"n-heading-secondary u-mb-small\">Detailed report and recommendations<\/h3>\n<\/div>\n<div><img decoding=\"async\" style=\"max-width: 80px; vertical-align: middle;\" src=\"https:\/\/cyberforces.com\/wp-content\/uploads\/report.webp;\" \/><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#B01E30&#8243; divider_weight=&#8221;5px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;25%&#8221; module_alignment=&#8221;left&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#151C4B&#8221; text_font_size=&#8221;1.2em&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>After the tests, you will receive a&nbsp;report detailing the simulations carried out, the vulnerabilities discovered, and recommendations for improvement. This makes it easier to&nbsp;plan your next steps \u2013 from additional staff training to&nbsp;enhancing security policies and procedures.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; disabled_on=&#8221;off|off|off&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#EDF2FA&#8221; overflow-x=&#8221;hidden&#8221; overflow-y=&#8221;hidden&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; admin_label=&#8221;Column&#8221; _builder_version=&#8221;4.27.4&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_color=&#8221;#151C4B&#8221; header_2_line_height=&#8221;1.2em&#8221; header_3_text_align=&#8221;center&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 style=\"text-align: center;\">Find out how the Social Engineering testing process works<\/h2>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#B01E30&#8243; divider_weight=&#8221;5px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;10%&#8221; module_alignment=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;90%&#8221; max_width=&#8221;1220px&#8221; custom_padding=&#8221;||||false|false&#8221; animation_style=&#8221;fade&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; module_class=&#8221;divilife-3-col-feature-blurb-slider&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_css_main_element=&#8221;display: flex;||flex-direction: column;&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Data Confidentiality Agreement&#8221; image=&#8221;https:\/\/cyberforces.com\/wp-content\/uploads\/01-1.png&#8221; image_icon_width=&#8221;150px&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#151C4B&#8221; header_font_size=&#8221;1em&#8221; body_text_align=&#8221;center&#8221; body_text_color=&#8221;#485060&#8243; body_font_size=&#8221;1.2em&#8221; background_color=&#8221;#FFFFFF&#8221; width=&#8221;90%&#8221; max_width=&#8221;350px&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||||true|true&#8221; custom_padding=&#8221;25px|25px|25px|25px|true|true&#8221; custom_css_main_element=&#8221; flex: 1;&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;10px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div class=\"cf_scroll_card\">\n<p style=\"text-align: center;\">We&nbsp;sign a&nbsp;data confidentiality agreement.<\/p>\n<\/div>\n<p>[\/et_pb_blurb][et_pb_blurb title=&#8221;Interview&#8221; image=&#8221;https:\/\/cyberforces.com\/wp-content\/uploads\/02.png&#8221; image_icon_width=&#8221;150px&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#151C4B&#8221; header_font_size=&#8221;1em&#8221; body_text_align=&#8221;center&#8221; body_text_color=&#8221;#485060&#8243; body_font_size=&#8221;1.2em&#8221; background_color=&#8221;#FFFFFF&#8221; width=&#8221;90%&#8221; max_width=&#8221;350px&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||||true|true&#8221; custom_padding=&#8221;25px|25px|25px|25px|true|true&#8221; custom_css_main_element=&#8221; flex: 1;&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;10px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div class=\"cf_scroll_card\">We&nbsp;interview the client to&nbsp;gather information about the company, understand its structure, and identify key resources and employees.<\/div>\n<p>[\/et_pb_blurb][et_pb_blurb title=&#8221;Entry points&#8221; image=&#8221;https:\/\/cyberforces.com\/wp-content\/uploads\/03.png&#8221; image_icon_width=&#8221;150px&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#151C4B&#8221; header_font_size=&#8221;1em&#8221; body_text_align=&#8221;center&#8221; body_text_color=&#8221;#485060&#8243; body_font_size=&#8221;1.2em&#8221; background_color=&#8221;#FFFFFF&#8221; width=&#8221;90%&#8221; max_width=&#8221;350px&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||||true|true&#8221; custom_padding=&#8221;25px|25px|25px|25px|true|true&#8221; custom_css_main_element=&#8221; flex: 1;&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;10px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div class=\"cf_scroll_card\">\n<p>We map entry points, look for vulnerabilities using white-label intelligence (e.g. the presence of the company and its employees on&nbsp;the network), verify attack vectors and their use during testing.<\/p>\n<\/div>\n<p>[\/et_pb_blurb][et_pb_blurb title=&#8221;Strategy&#8221; image=&#8221;https:\/\/cyberforces.com\/wp-content\/uploads\/04.png&#8221; image_icon_width=&#8221;150px&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#151C4B&#8221; header_font_size=&#8221;1em&#8221; body_text_align=&#8221;center&#8221; body_text_color=&#8221;#485060&#8243; body_font_size=&#8221;1.2em&#8221; background_color=&#8221;#FFFFFF&#8221; width=&#8221;90%&#8221; max_width=&#8221;350px&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||||true|true&#8221; custom_padding=&#8221;25px|25px|25px|25px|true|true&#8221; custom_css_main_element=&#8221; flex: 1;&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;10px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div class=\"cf_scroll_card\">\nTogether with the client, we&nbsp;develop a&nbsp;test scenario to&nbsp;make it look as&nbsp;realistic as&nbsp;possible.\n<\/div>\n<p>[\/et_pb_blurb][et_pb_blurb title=&#8221;Testing&#8221; image=&#8221;https:\/\/cyberforces.com\/wp-content\/uploads\/05.png&#8221; image_icon_width=&#8221;150px&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#151C4B&#8221; header_font_size=&#8221;1em&#8221; body_text_align=&#8221;center&#8221; body_text_color=&#8221;#485060&#8243; body_font_size=&#8221;1.2em&#8221; background_color=&#8221;#FFFFFF&#8221; width=&#8221;90%&#8221; max_width=&#8221;350px&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||||true|true&#8221; custom_padding=&#8221;25px|25px|25px|25px|true|true&#8221; custom_css_free_form=&#8221;||&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;10px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div class=\"cf_scroll_card\">\n<p>We simulate an attack using social engineering, according to&nbsp;a&nbsp;scenario. This could be, for example, a&nbsp;break-in to&nbsp;a&nbsp;company&#8217;s headquarters or&nbsp;a&nbsp;remote attack using spearphishing.<\/p>\n<\/div>\n<p>[\/et_pb_blurb][et_pb_blurb title=&#8221;Report&#8221; image=&#8221;https:\/\/cyberforces.com\/wp-content\/uploads\/06.png&#8221; image_icon_width=&#8221;150px&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#151C4B&#8221; header_font_size=&#8221;1em&#8221; body_text_align=&#8221;center&#8221; body_text_color=&#8221;#485060&#8243; body_font_size=&#8221;1.2em&#8221; background_color=&#8221;#FFFFFF&#8221; width=&#8221;90%&#8221; max_width=&#8221;350px&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||||true|true&#8221; custom_padding=&#8221;25px|25px|25px|25px|true|true&#8221; custom_css_main_element=&#8221; flex: 1;&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;10px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div class=\"cf_scroll_card\">\n<p>We prepare a&nbsp;report showing the resources we&nbsp;have accessed, the entry points and the resulting business risks. We&nbsp;suggest training for employees.<\/p>\n<\/div>\n<p>[\/et_pb_blurb][et_pb_blurb title=&#8221;Recommendations&#8221; image=&#8221;https:\/\/cyberforces.com\/wp-content\/uploads\/07.png&#8221; image_icon_width=&#8221;150px&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#151C4B&#8221; header_font_size=&#8221;1em&#8221; body_text_align=&#8221;center&#8221; body_text_color=&#8221;#485060&#8243; body_font_size=&#8221;1.2em&#8221; background_color=&#8221;#FFFFFF&#8221; width=&#8221;90%&#8221; max_width=&#8221;350px&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||||true|true&#8221; custom_padding=&#8221;25px|25px|25px|25px|true|true&#8221; custom_css_main_element=&#8221; flex: 1;&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;10px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div class=\"cf_scroll_card\">We&nbsp;suggest which layers of the security system should be&nbsp;strengthened and how to&nbsp;develop protocols to&nbsp;avoid similar situations in&nbsp;the future. At&nbsp;the client&#8217;s request, we&nbsp;conduct training with employees.<\/div>\n<p>[\/et_pb_blurb][et_pb_blurb title=&#8221;Retesting&#8221; image=&#8221;https:\/\/cyberforces.com\/wp-content\/uploads\/08.png&#8221; image_icon_width=&#8221;150px&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#151C4B&#8221; header_font_size=&#8221;1em&#8221; body_text_align=&#8221;center&#8221; body_text_color=&#8221;#485060&#8243; body_font_size=&#8221;1.2em&#8221; background_color=&#8221;#FFFFFF&#8221; width=&#8221;90%&#8221; max_width=&#8221;350px&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||||true|true&#8221; custom_padding=&#8221;25px|25px|25px|25px|true|true&#8221; custom_css_main_element=&#8221; flex: 1;&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;10px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div class=\"cf_scroll_card\">\n<p>We recommend conducting retests to&nbsp;verify the effectiveness of new security strategies, to&nbsp;show the customer whether previous attack paths are still exploitable, and to&nbsp;verify other possible attack vectors on&nbsp;the customer&#8217;s systems.<\/p>\n<\/div>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; width=&#8221;50%&#8221; custom_padding=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_code admin_label=&#8221;Custom CSS &#038; JS&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; min_height=&#8221;40px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<style><!-- [et_pb_line_break_holder] -->.slick-slider {<!-- [et_pb_line_break_holder] -->  -webkit-user-select: none;<!-- [et_pb_line_break_holder] -->  -moz-user-select: none;<!-- [et_pb_line_break_holder] -->  -ms-user-select: none;<!-- [et_pb_line_break_holder] -->  user-select: none;<!-- [et_pb_line_break_holder] -->  -webkit-touch-callout: none;<!-- [et_pb_line_break_holder] -->  -khtml-user-select: none;<!-- [et_pb_line_break_holder] -->  ms-touch-action: pan-y;<!-- [et_pb_line_break_holder] -->  touch-action: pan-y;<!-- [et_pb_line_break_holder] -->  -webkit-tap-highlight-color: transparent;<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] -->.slick-list {<!-- [et_pb_line_break_holder] -->  position: relative;<!-- [et_pb_line_break_holder] -->  display: block;<!-- [et_pb_line_break_holder] -->  overflow-x: hidden;<!-- [et_pb_line_break_holder] -->  margin: 0 0 50px 0;<!-- [et_pb_line_break_holder] -->  padding: 0 0 0px;<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->.slick-track:before, .slick-track:after {<!-- [et_pb_line_break_holder] -->  display: table;<!-- [et_pb_line_break_holder] -->  content: '';<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] -->  <!-- [et_pb_line_break_holder] -->.slick-slide {<!-- [et_pb_line_break_holder] -->  position: relative;<!-- [et_pb_line_break_holder] -->  float: left;<!-- [et_pb_line_break_holder] -->  height: 100%;<!-- [et_pb_line_break_holder] -->  display: flex;<!-- [et_pb_line_break_holder] -->  align-items: stretch;<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] -->  <!-- [et_pb_line_break_holder] -->.divilife-3-col-feature-blurb-slider .slick-arrow, .divilife-3-col-feature-blurb-slider .slick-arrow:hover, .divilife-3-col-feature-blurb-slider .slick-arrow:focus {<!-- [et_pb_line_break_holder] -->position: absolute;<!-- [et_pb_line_break_holder] -->font-size: 0;<!-- [et_pb_line_break_holder] -->line-height: 0;<!-- [et_pb_line_break_holder] -->padding: 0;<!-- [et_pb_line_break_holder] -->color: transparent;<!-- [et_pb_line_break_holder] -->outline: none;<!-- [et_pb_line_break_holder] -->background: #DADBE2;<!-- [et_pb_line_break_holder] -->border: none;<!-- [et_pb_line_break_holder] -->cursor: pointer;<!-- [et_pb_line_break_holder] -->top: 50%;<!-- [et_pb_line_break_holder] -->transform: translateY(-50%);<!-- [et_pb_line_break_holder] -->z-index: 100;<!-- [et_pb_line_break_holder] -->height: 50px;<!-- [et_pb_line_break_holder] -->vertical-align: middle;<!-- [et_pb_line_break_holder] -->border-radius: 50%;<!-- [et_pb_line_break_holder] -->width: 50px;<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] -->.divilife-3-col-feature-blurb-slider .slick-prev { left: -70px; }<!-- [et_pb_line_break_holder] -->.divilife-3-col-feature-blurb-slider .slick-next { right: -70px; }<!-- [et_pb_line_break_holder] -->  <!-- [et_pb_line_break_holder] -->.divilife-3-col-feature-blurb-slider .slick-arrow:before {<!-- [et_pb_line_break_holder] -->font-family: ETmodules;<!-- [et_pb_line_break_holder] -->background: transparent;<!-- [et_pb_line_break_holder] -->opacity: 1;<!-- [et_pb_line_break_holder] -->font-size: 46px;<!-- [et_pb_line_break_holder] -->vertical-align: middle;<!-- [et_pb_line_break_holder] -->\/*color: #151c4b;*\/<!-- [et_pb_line_break_holder] -->color: #ffffff;<!-- [et_pb_line_break_holder] -->text-align: center;<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] -->.divilife-3-col-feature-blurb-slider .slick-arrow:hover:before { opacity: 0.8; }<!-- [et_pb_line_break_holder] -->.divilife-3-col-feature-blurb-slider .slick-prev:before { content: '\\34'; }<!-- [et_pb_line_break_holder] -->.divilife-3-col-feature-blurb-slider .slick-next:before { content: '\\35'; } <!-- [et_pb_line_break_holder] -->  <!-- [et_pb_line_break_holder] -->.entry-content ul.slick-dots {<!-- [et_pb_line_break_holder] -->  position: absolute;<!-- [et_pb_line_break_holder] -->  bottom: 0;<!-- [et_pb_line_break_holder] -->  display: block;<!-- [et_pb_line_break_holder] -->  width: 100%;<!-- [et_pb_line_break_holder] -->  padding: 0;<!-- [et_pb_line_break_holder] -->  margin: 0;<!-- [et_pb_line_break_holder] -->  list-style: none;<!-- [et_pb_line_break_holder] -->  text-align: center;<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] -->.slick-dots li {<!-- [et_pb_line_break_holder] -->  position: relative;<!-- [et_pb_line_break_holder] -->  display: inline-block;<!-- [et_pb_line_break_holder] -->  margin: 0 5px;<!-- [et_pb_line_break_holder] -->  padding: 0;<!-- [et_pb_line_break_holder] -->  cursor: pointer;<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] -->.slick-dots li button {<!-- [et_pb_line_break_holder] -->\tfont-size: 0;<!-- [et_pb_line_break_holder] -->\tline-height: 0;<!-- [et_pb_line_break_holder] -->\tdisplay: block;<!-- [et_pb_line_break_holder] -->\twidth: 10px;<!-- [et_pb_line_break_holder] -->\theight: 10px;<!-- [et_pb_line_break_holder] -->\tpadding: 0;<!-- [et_pb_line_break_holder] -->\tcursor: pointer;<!-- [et_pb_line_break_holder] -->\tcolor: transparent;<!-- [et_pb_line_break_holder] -->\tborder: 0;<!-- [et_pb_line_break_holder] -->\toutline: none;<!-- [et_pb_line_break_holder] -->\tbackground-color: #DADBE2;<!-- [et_pb_line_break_holder] -->  border-radius: 10px;<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] -->.slick-dots li.slick-active button { background-color: #B01E30; }<!-- [et_pb_line_break_holder] -->  <!-- [et_pb_line_break_holder] -->@media(max-width: 980px) {<!-- [et_pb_line_break_holder] -->\t.divilife-3-col-feature-blurb-slider .slick-prev { left: -32px; }<!-- [et_pb_line_break_holder] -->\t.divilife-3-col-feature-blurb-slider .slick-next { right: -30px; }<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] -->@media(max-width: 499px) {<!-- [et_pb_line_break_holder] -->\t.divilife-3-col-feature-blurb-slider .slick-prev { left: -26px; }<!-- [et_pb_line_break_holder] -->\t.divilife-3-col-feature-blurb-slider .slick-next { right: -24px; }<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] -->  <!-- [et_pb_line_break_holder] --><\/style>\n<p><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] --><script src=\"https:\/\/cdnjs.cloudflare.com\/ajax\/libs\/slick-carousel\/1.6.0\/slick.js\"><\/script><!-- [et_pb_line_break_holder] --><script><!-- [et_pb_line_break_holder] -->jQuery(document).ready(function() {<!-- [et_pb_line_break_holder] -->\tjQuery('.divilife-3-col-feature-blurb-slider').slick({<!-- [et_pb_line_break_holder] -->    dots: true,<!-- [et_pb_line_break_holder] -->    slidesToShow: 3,<!-- [et_pb_line_break_holder] -->    slidesToScroll: 1,<!-- [et_pb_line_break_holder] -->    responsive: [<!-- [et_pb_line_break_holder] -->      {<!-- [et_pb_line_break_holder] -->        breakpoint: 1200,<!-- [et_pb_line_break_holder] -->        settings: {<!-- [et_pb_line_break_holder] -->          slidesToShow: 2<!-- [et_pb_line_break_holder] -->        }<!-- [et_pb_line_break_holder] -->      },<!-- [et_pb_line_break_holder] -->      {<!-- [et_pb_line_break_holder] -->        breakpoint: 767,<!-- [et_pb_line_break_holder] -->        settings: {<!-- [et_pb_line_break_holder] -->          slidesToShow: 1<!-- [et_pb_line_break_holder] -->        }<!-- [et_pb_line_break_holder] -->      }<!-- [et_pb_line_break_holder] -->    ]<!-- [et_pb_line_break_holder] -->  }); <!-- [et_pb_line_break_holder] -->});<!-- [et_pb_line_break_holder] --><\/script>[\/et_pb_code][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#EDF2FA&#8221; custom_margin=&#8221;0px||||false|false&#8221; custom_padding=&#8221;0px||40px||false|false&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_color=&#8221;#151C4B&#8221; header_3_text_align=&#8221;center&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 style=\"text-align: center;\">Types of Social Engineering Tests<\/h2>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#B01E30&#8243; divider_weight=&#8221;5px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;10%&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; animation_style=&#8221;fade&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; custom_css_main_element_last_edited=&#8221;on|phone&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; custom_padding=&#8221;12px|24px|12px|24px|true|false&#8221; custom_css_main_element=&#8221;||||||&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;10px&#8221; global_colors_info=&#8221;{}&#8221; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221; transform_scale__hover=&#8221;105%|105%&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; header_2_text_color=&#8221;#151C4B&#8221; header_3_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; header_3_text_color=&#8221;#151C4B&#8221; custom_margin=&#8221;10px||0px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; custom_css_before=&#8221;||&#8221; border_color_bottom=&#8221;#B01E30&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div style=\"display: flex; justify-content: space-between; align-items: center;\">\n<div>\n<h3 class=\"n-heading-secondary u-mb-small\">Phishing<\/h3>\n<\/div>\n<div><img decoding=\"async\" style=\"max-width: 80px; vertical-align: middle;\" src=\"https:\/\/cyberforces.com\/wp-content\/uploads\/phishing.webp;\" \/><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#B01E30&#8243; divider_weight=&#8221;5px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;50%&#8221; module_alignment=&#8221;left&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>This simulation involves sending convincing but fake email messages to&nbsp;employees. The aim is to&nbsp;trick the recipient into clicking a&nbsp;malicious link, downloading a&nbsp;malware-laden attachment, or&nbsp;divulging sensitive information (like passwords). A&nbsp;phishing test reveals how many employees can be&nbsp;duped by&nbsp;such an attempt and whether they follow the company\u2019s security guidelines for email communication.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjIyNjE1NyJ9fQ==@&#8221; button_text=&#8221;Learn more&#8221; button_alignment=&#8221;right&#8221; _builder_version=&#8221;4.27.4&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;12px&#8221; button_text_color=&#8221;#EDF2FA&#8221; button_bg_color=&#8221;#151C4B&#8221; button_border_width=&#8221;3px&#8221; button_border_color=&#8221;#151C4B&#8221; button_border_radius=&#8221;10px&#8221; button_font=&#8221;Nunito Sans|700||on|||||&#8221; button_use_icon=&#8221;off&#8221; custom_margin=&#8221;||15px||false|false&#8221; custom_padding=&#8221;3px|16px|3px|16px|true|true&#8221; button_bg_color_last_edited=&#8221;off|desktop&#8221; global_colors_info=&#8221;{}&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_color__hover=&#8221;#FFFFFF&#8221; button_bg_enable_color__hover=&#8221;on&#8221; button_text_color__hover_enabled=&#8221;on|desktop&#8221; button_text_color__hover=&#8221;#151C4B&#8221; button_border_color__hover_enabled=&#8221;on|hover&#8221; button_border_color__hover=&#8221;#151C4B&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; custom_padding=&#8221;12px|24px|12px|24px|true|false&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;10px&#8221; global_colors_info=&#8221;{}&#8221; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover=&#8221;105%|105%&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; header_2_text_color=&#8221;#151C4B&#8221; header_3_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; header_3_text_color=&#8221;#151C4B&#8221; custom_margin=&#8221;10px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div style=\"display: flex; justify-content: space-between; align-items: center;\">\n<div>\n<h3 class=\"n-heading-secondary u-mb-small\">Smishing<\/h3>\n<\/div>\n<div><img decoding=\"async\" style=\"max-width: 80px; vertical-align: middle;\" src=\"https:\/\/cyberforces.com\/wp-content\/uploads\/smishing_2.webp;\" \/><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#B01E30&#8243; divider_weight=&#8221;5px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;50%&#8221; module_alignment=&#8221;left&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>In&nbsp;a&nbsp;smishing test, employees receive fraudulent SMS texts on&nbsp;their phones. The message pretends to&nbsp;be&nbsp;from a&nbsp;trusted source (such as&nbsp;a&nbsp;bank, courier or&nbsp;other service) and asks the recipient to&nbsp;take a&nbsp;certain action (for example, clicking a&nbsp;link or&nbsp;providing a&nbsp;code). Smishing checks your staff\u2019s vigilance when an attack comes via the mobile channel \u2013 often seen as&nbsp;a&nbsp;less formal medium that can more easily lull the target into a&nbsp;false sense of security.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjIyNjE3MCJ9fQ==@&#8221; button_text=&#8221;Learn more&#8221; button_alignment=&#8221;right&#8221; _builder_version=&#8221;4.27.4&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;12px&#8221; button_text_color=&#8221;#EDF2FA&#8221; button_bg_color=&#8221;#151C4B&#8221; button_border_width=&#8221;3px&#8221; button_border_color=&#8221;#151C4B&#8221; button_border_radius=&#8221;10px&#8221; button_font=&#8221;Nunito Sans|700||on|||||&#8221; button_use_icon=&#8221;off&#8221; custom_margin=&#8221;||15px||false|false&#8221; custom_padding=&#8221;3px|16px|3px|16px|true|true&#8221; button_bg_color_last_edited=&#8221;off|desktop&#8221; global_colors_info=&#8221;{}&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_color__hover=&#8221;#FFFFFF&#8221; button_bg_enable_color__hover=&#8221;on&#8221; button_text_color__hover_enabled=&#8221;on|desktop&#8221; button_text_color__hover=&#8221;#151C4B&#8221; button_border_color__hover_enabled=&#8221;on|hover&#8221; button_border_color__hover=&#8221;#151C4B&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; animation_style=&#8221;fade&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; custom_css_main_element_last_edited=&#8221;on|phone&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; custom_padding=&#8221;12px|24px|12px|24px|true|false&#8221; custom_css_main_element=&#8221;||||||&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;10px&#8221; global_colors_info=&#8221;{}&#8221; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221; transform_scale__hover=&#8221;105%|105%&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; header_2_text_color=&#8221;#151C4B&#8221; header_3_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; header_3_text_color=&#8221;#151C4B&#8221; custom_margin=&#8221;10px||0px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; custom_css_before=&#8221;||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div style=\"display: flex; justify-content: space-between; align-items: center;\">\n<div>\n<h3 class=\"n-heading-secondary u-mb-small\">Vishing<\/h3>\n<\/div>\n<div><img decoding=\"async\" style=\"max-width: 80px; vertical-align: middle;\" src=\"https:\/\/cyberforces.com\/wp-content\/uploads\/vishing_2.webp;\" \/><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#B01E30&#8243; divider_weight=&#8221;5px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;50%&#8221; module_alignment=&#8221;left&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Vishing involves a&nbsp;controlled attempt to&nbsp;steal information through a&nbsp;phone call. The tester calls targeted employees, posing as&nbsp;an IT support technician, a&nbsp;bank official, or&nbsp;another credible figure. During the conversation, the caller tries to&nbsp;coax the victim into revealing confidential data or&nbsp;performing certain actions (like changing a&nbsp;password to&nbsp;one provided by&nbsp;the caller). A&nbsp;vishing test examines whether employees can recognise a&nbsp;phone scam and adhere to&nbsp;security procedures even in&nbsp;a&nbsp;direct conversation.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjIyNjE3NyJ9fQ==@&#8221; button_text=&#8221;Learn more&#8221; button_alignment=&#8221;right&#8221; _builder_version=&#8221;4.27.4&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;12px&#8221; button_text_color=&#8221;#EDF2FA&#8221; button_bg_color=&#8221;#151C4B&#8221; button_border_width=&#8221;3px&#8221; button_border_color=&#8221;#151C4B&#8221; button_border_radius=&#8221;10px&#8221; button_font=&#8221;Nunito Sans|700||on|||||&#8221; button_use_icon=&#8221;off&#8221; custom_margin=&#8221;||15px||false|false&#8221; custom_padding=&#8221;3px|16px|3px|16px|true|true&#8221; button_bg_color_last_edited=&#8221;off|desktop&#8221; global_colors_info=&#8221;{}&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_color__hover=&#8221;#FFFFFF&#8221; button_bg_enable_color__hover=&#8221;on&#8221; button_text_color__hover_enabled=&#8221;on|desktop&#8221; button_text_color__hover=&#8221;#151C4B&#8221; button_border_color__hover_enabled=&#8221;on|hover&#8221; button_border_color__hover=&#8221;#151C4B&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; custom_padding=&#8221;12px|24px|12px|24px|true|false&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;10px&#8221; global_colors_info=&#8221;{}&#8221; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover=&#8221;105%|105%&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; header_2_text_color=&#8221;#151C4B&#8221; header_3_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; header_3_text_color=&#8221;#151C4B&#8221; custom_margin=&#8221;10px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div style=\"display: flex; justify-content: space-between; align-items: center;\">\n<div>\n<h3 class=\"n-heading-secondary u-mb-small\">Physical entry (infiltration)<\/h3>\n<\/div>\n<div><img decoding=\"async\" style=\"max-width: 80px; vertical-align: middle;\" src=\"https:\/\/cyberforces.com\/wp-content\/uploads\/entries.webp;\" \/><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#B01E30&#8243; divider_weight=&#8221;5px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;50%&#8221; module_alignment=&#8221;left&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>This test entails an unauthorised person attempting to\u00a0physically gain access to\u00a0the company\u2019s secured premises. The tester may pose as\u00a0a\u00a0visitor, courier, maintenance worker or\u00a0even an employee in\u00a0order to\u00a0get into the office, server room or\u00a0other sensitive areas. The goal is to\u00a0check the effectiveness of physical security and access control: can someone enter without a\u00a0badge or\u00a0pass? Will employees challenge an unfamiliar person in\u00a0a\u00a0restricted area? Are there vulnerabilities that would allow an intruder to\u00a0slip inside?<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjIyNjE4NiJ9fQ==@&#8221; button_text=&#8221;Learn more&#8221; button_alignment=&#8221;right&#8221; _builder_version=&#8221;4.27.4&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;12px&#8221; button_text_color=&#8221;#EDF2FA&#8221; button_bg_color=&#8221;#151C4B&#8221; button_border_width=&#8221;3px&#8221; button_border_color=&#8221;#151C4B&#8221; button_border_radius=&#8221;10px&#8221; button_font=&#8221;Nunito Sans|700||on|||||&#8221; button_use_icon=&#8221;off&#8221; custom_margin=&#8221;||15px||false|false&#8221; custom_padding=&#8221;3px|16px|3px|16px|true|true&#8221; hover_enabled=&#8221;0&#8243; button_bg_color_last_edited=&#8221;off|desktop&#8221; global_colors_info=&#8221;{}&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_color__hover=&#8221;#FFFFFF&#8221; button_bg_enable_color__hover=&#8221;on&#8221; button_text_color__hover_enabled=&#8221;on|desktop&#8221; button_text_color__hover=&#8221;#151C4B&#8221; button_border_color__hover_enabled=&#8221;on|hover&#8221; button_border_color__hover=&#8221;#151C4B&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_direction=&#8221;45deg&#8221; background_color_gradient_stops=&#8221;#b01e30 0%|#151c4b 100%&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;20px||20px||false|false&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; header_2_line_height=&#8221;1.2em&#8221; header_3_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; header_3_text_color=&#8221;#FFFFFF&#8221; custom_margin=&#8221;||||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 class=\"n-heading-secondary u-mb-small\" style=\"text-align: center;\">Contact us and learn more<\/h2>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;#contact&#8221; button_text=&#8221;Contact us&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;16px&#8221; button_text_color=&#8221;#EDF2FA&#8221; button_bg_color=&#8221;#B01E30&#8243; button_border_width=&#8221;3px&#8221; button_border_color=&#8221;#B01E30&#8243; button_border_radius=&#8221;10px&#8221; button_font=&#8221;Nunito Sans|700||on|||||&#8221; button_use_icon=&#8221;off&#8221; custom_margin=&#8221;||15px||false|false&#8221; custom_padding=&#8221;5px|20px|5px|20px|true|true&#8221; button_bg_color_last_edited=&#8221;off|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_color__hover=&#8221;#FFFFFF&#8221; button_bg_enable_color__hover=&#8221;on&#8221; button_text_color__hover_enabled=&#8221;on|desktop&#8221; button_text_color__hover=&#8221;#151C4B&#8221; button_border_color__hover_enabled=&#8221;on|desktop&#8221; button_border_color__hover=&#8221;#FFFFFF&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#EDF2FA&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_color=&#8221;#151C4B&#8221; header_3_text_align=&#8221;center&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 style=\"text-align: center;\">Frequently asked questions<\/h2>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#B01E30&#8243; divider_weight=&#8221;5px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;10%&#8221; module_alignment=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#EDF2FA&#8221; width=&#8221;100%&#8221; width_tablet=&#8221;90%&#8221; width_phone=&#8221;90%&#8221; width_last_edited=&#8221;on|tablet&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; custom_padding=&#8221;0px|0px|0px|0px|false|false&#8221; custom_css_main_element=&#8221;display: flex;||flex-direction: column;||justify-content: space-between;||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_accordion open_toggle_text_color=&#8221;#151C4B&#8221; closed_toggle_background_color=&#8221;#FFFFFF&#8221; toggle_icon=&#8221;&#x50;||divi||400&#8243; icon_color=&#8221;#151C4B&#8221; use_icon_font_size=&#8221;on&#8221; icon_font_size=&#8221;28px&#8221; module_id=&#8221;cf_accordion&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; toggle_text_color=&#8221;#151C4B&#8221; toggle_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; toggle_font_size=&#8221;1.5em&#8221; toggle_line_height=&#8221;1.2em&#8221; body_text_color=&#8221;#485060&#8243; body_font_size=&#8221;1.1em&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; border_width_all=&#8221;0px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;10px&#8221; box_shadow_color=&#8221;rgba(175,183,194,0.5)&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_accordion_item title=&#8221;What is social engineering?&#8221; open=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>This is a&nbsp;hacker attack vector designed to&nbsp;deceive the user (employee). It uses deception techniques to&nbsp;manipulate the victim into revealing sensitive data or&nbsp;unknowingly granting access to&nbsp;it by&nbsp;clicking a&nbsp;link or&nbsp;downloading malware.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;What does a social engineering attack look like?&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; open=&#8221;off&#8221;]<\/p>\n<p>After interviewing the client, we&nbsp;attempt to&nbsp;breach their security and conduct a&nbsp;social engineering attack, the consequences of which we&nbsp;will discuss during a&nbsp;post-test training session.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;What is phishing? &#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; open=&#8221;off&#8221;]<\/p>\n<p>This is a&nbsp;widespread technique that uses email and text messages to&nbsp;trick users into revealing sensitive information or&nbsp;downloading camouflaged malware.<\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_accordion open_toggle_text_color=&#8221;#151C4B&#8221; closed_toggle_background_color=&#8221;#FFFFFF&#8221; toggle_icon=&#8221;&#x50;||divi||400&#8243; icon_color=&#8221;#151C4B&#8221; use_icon_font_size=&#8221;on&#8221; icon_font_size=&#8221;28px&#8221; module_id=&#8221;cf_accordion&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; toggle_text_color=&#8221;#151C4B&#8221; toggle_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; toggle_font_size=&#8221;1.5em&#8221; toggle_line_height=&#8221;1.2em&#8221; body_text_color=&#8221;#485060&#8243; body_font_size=&#8221;1.1em&#8221; custom_css_free_form=&#8221;.et_pb_accordion .et_pb_toggle_open .et_pb_toggle_title:before {|| display: block!important;|| content: %22%924f%22 !important;|| color: #b01e30;||}||||.et_pb_toggle_open .et_pb_toggle_content::before {|| position: absolute;|| top: 10%;|| content: %22 %22;|| width: 30%;|| background: #B01E30;|| height: 3px;|| left: 0%;|| right: 0%;|| ||}&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; border_width_all=&#8221;0px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;10px&#8221; box_shadow_color=&#8221;rgba(175,183,194,0.5)&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_accordion_item title=&#8221;What is baiting?&#8221; open=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>In&nbsp;this context, it is a&nbsp;trick used by&nbsp;hackers to&nbsp;obtain confidential user data, such as&nbsp;their account number or&nbsp;insurance. To&nbsp;do&nbsp;this, they use messages containing phishing messages, such as&nbsp;special offers, forms, non-existent winnings, etc.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;How to prevent phishing?&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; open=&#8221;off&#8221;]<\/p>\n<p>Being alert to&nbsp;suspicious behavior and having a&nbsp;high level of threat awareness is key. Knowledge of techniques used to&nbsp;scam people will also help.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;Who can fall victim to social engineering attacks?&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; open=&#8221;off&#8221;]<\/p>\n<p>Absolutely everyone. In&nbsp;the age of ubiquitous digitalization, each of us has remote access to&nbsp;a&nbsp;huge amount of valuable information. The driving force of a&nbsp;malevolent hacker is profit, so their target will often be&nbsp;companies. If you think you are too small an organization to&nbsp;be&nbsp;attacked, you are only making things easier for them by&nbsp;not caring about your own security. Everyone has data that can be&nbsp;monetized in&nbsp;one way or&nbsp;another.<\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#EDF2FA&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;20px||20px||false|false&#8221; da_disable_devices=&#8221;off|off|off&#8221; border_radii=&#8221;off||||&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_color=&#8221;#151C4B&#8221; header_3_text_align=&#8221;center&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 style=\"text-align: center;\">Request a&nbsp;Quote<\/h2>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#B01E30&#8243; divider_weight=&#8221;5px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;10%&#8221; module_alignment=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; make_equal=&#8221;on&#8221; module_id=&#8221;contact&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; background_enable_color=&#8221;off&#8221; width=&#8221;100%&#8221; width_tablet=&#8221;90%&#8221; width_phone=&#8221;90%&#8221; width_last_edited=&#8221;on|tablet&#8221; custom_margin=&#8221;||75px||false|false&#8221; custom_padding=&#8221;0px||||false|false&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;10px&#8221; global_module=&#8221;252241&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#151C4B&#8221; custom_padding=&#8221;0px|0px|0px|0px|false|false&#8221; custom_css_main_element=&#8221;display: flex;||flex-direction: column;||justify-content: space-between;||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_4_text_color=&#8221;#FFFFFF&#8221; header_4_font_size=&#8221;24px&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_padding=&#8221;48px|||48px|false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4>Contact details<\/h4>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#B01E30&#8243; divider_weight=&#8221;5px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;20%&#8221; module_alignment=&#8221;left&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;|||48px|false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_code _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;24px||24px|48px|false|false&#8221; custom_css_free_form=&#8221;.contact-item {||    display: flex;||    align-items: center;||    margin-bottom: 15px;||  \tcolor: white;||  \tfont-size: 1.2em;||}||||\/*.contact-item .et-pb-icon {||    font-size: 28px;||    color: #B01E30;||    margin-right: 12px;||  \tfont-weight: bold;||}*\/||||.contact-item a\u00a0{||    color: white;||    text-decoration: none;||}||||.contact-item a:hover {||    text-decoration: underline;||}||||.address {||    align-items: flex-start;||}||||.address-details {||    display: flex;||    flex-direction: column;||}||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div class=\"contact-container\"><!-- [et_pb_line_break_holder] -->\t<\/p>\n<div class=\"contact-item\"><!-- [et_pb_line_break_holder] -->    <span class=\"et-pb-icon\">\ue010<!-- [et_pb_line_break_holder] -->\t\t<\/span><!-- [et_pb_line_break_holder] -->\t<a href=\"mailto:info@cyberforces.com\">info@cyberforces.com<\/a><!-- [et_pb_line_break_holder] -->\t<\/div>\n<p><!-- [et_pb_line_break_holder] -->\t<\/p>\n<div class=\"contact-item\"><!-- [et_pb_line_break_holder] -->  \t<span class=\"et-pb-icon\">\ue00b<!-- [et_pb_line_break_holder] -->    <\/span><!-- [et_pb_line_break_holder] -->    <span>+48 505 372 810<!-- [et_pb_line_break_holder] -->\t\t<\/span><!-- [et_pb_line_break_holder] -->  <\/div>\n<p><!-- [et_pb_line_break_holder] -->  <\/p>\n<div class=\"contact-item address\"><!-- [et_pb_line_break_holder] -->\t\t<span class=\"et-pb-icon\">\ue0ef<!-- [et_pb_line_break_holder] -->\t\t<\/span><!-- [et_pb_line_break_holder] -->    <\/p>\n<div class=\"address-details\"><!-- [et_pb_line_break_holder] -->      <span>TestArmy Group S.A.<!-- [et_pb_line_break_holder] -->\t\t\t<\/span><!-- [et_pb_line_break_holder] -->      <span>ul.\u00a0Petuniowa 9\/5<!-- [et_pb_line_break_holder] -->\t\t\t<\/span><!-- [et_pb_line_break_holder] -->\t\t\t<span>53-238 Wroc\u0142aw<!-- [et_pb_line_break_holder] -->\t\t\t<\/span><!-- [et_pb_line_break_holder] -->\t\t\t<span>Polska<!-- [et_pb_line_break_holder] -->\t\t\t<\/span><!-- [et_pb_line_break_holder] -->    <\/div>\n<p><!-- [et_pb_line_break_holder] -->  <\/div>\n<p><!-- [et_pb_line_break_holder] --><\/div>\n<p>[\/et_pb_code][et_pb_image src=&#8221;https:\/\/cyberforces.com\/wp-content\/uploads\/cf_team.webp&#8221; title_text=&#8221;cf_team&#8221; show_bottom_space=&#8221;off&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_contact_form captcha=&#8221;off&#8221; email=&#8221;katarzyna.wojcik@testarmy.com, info@cyberforces.com&#8221; custom_message=&#8221;Nowa wiadomo\u015b\u0107:||et_pb_line_break_holder||||et_pb_line_break_holder||Imi\u0119 i\u00a0nazwisko: %%Name%%||et_pb_line_break_holder||Telefon: %%Phone%%||et_pb_line_break_holder||Email: %%Email%%||et_pb_line_break_holder||Firma: %%Company%%||et_pb_line_break_holder||Wiadomo\u015b\u0107: %%Message%%&#8221; success_message=&#8221;Thank you! Your message has been sent.&#8221; submit_button_text=&#8221;Send&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; _unique_id=&#8221;c7bf614e-40dc-4f51-a574-09da4b946dfc&#8221; form_field_background_color=&#8221;RGBA(255,255,255,0)&#8221; form_field_text_color=&#8221;#151C4B&#8221; form_field_focus_background_color=&#8221;#EDF2FA&#8221; form_field_focus_text_color=&#8221;#151C4B&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;16px&#8221; button_text_color=&#8221;#EDF2FA&#8221; button_bg_color=&#8221;#B01E30&#8243; button_border_width=&#8221;3px&#8221; button_border_color=&#8221;#B01E30&#8243; button_border_radius=&#8221;10px&#8221; button_font=&#8221;Nunito Sans|700||on|||||&#8221; button_use_icon=&#8221;off&#8221; module_alignment=&#8221;center&#8221; custom_padding=&#8221;48px|48px|48px|48px|false|true&#8221; border_width_bottom=&#8221;1px&#8221; border_color_bottom=&#8221;#151C4B&#8221; global_colors_info=&#8221;{}&#8221; button_text_color__hover=&#8221;#B01E30&#8243; button_text_color__hover_enabled=&#8221;on|desktop&#8221; button_bg_color__hover=&#8221;#FFFFFF&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_border_color__hover=&#8221;#B01E30&#8243; button_border_color__hover_enabled=&#8221;on|hover&#8221;][et_pb_contact_field field_id=&#8221;Name&#8221; field_title=&#8221;First name&#8221; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; global_colors_info=&#8221;{}&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Email&#8221; field_title=&#8221;E-mail&#8221; field_type=&#8221;email&#8221; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; global_colors_info=&#8221;{}&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Message&#8221; field_title=&#8221;How can we\u00a0help you?&#8221; field_type=&#8221;text&#8221; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; global_colors_info=&#8221;{}&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;GDPR&#8221; field_type=&#8221;checkbox&#8221; checkbox_options=&#8221;%91{%22value%22:%22Yes, I\u00a0give my\u00a0consent to\u00a0have my\u00a0personal data provided in\u00a0the form processed by\u00a0TestArmy Group S.A. based in\u00a0Wroc\u0142aw on\u00a0Petuniowa 9\/5 Street for marketing purposes*%22,%22checked%22:0,%22dragID%22:-1}%93&#8243; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; form_field_text_color=&#8221;#485060&#8243; custom_css_free_form=&#8221;.et_pb_contact_field_options_title {||  display: none!important;||} &#8221; border_width_all=&#8221;1px&#8221; border_color_all=&#8221;#485060&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Privacy_Policy&#8221; field_type=&#8221;checkbox&#8221; checkbox_options=&#8221;%91{%22value%22:%22I have read and understood the privacy policy, including its clauses, and I\u00a0accept its terms.*%22,%22checked%22:0,%22dragID%22:-1}%93&#8243; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; form_field_text_color=&#8221;#485060&#8243; border_width_all=&#8221;1px&#8221; border_color_all=&#8221;#485060&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_contact_field][\/et_pb_contact_form][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Social EngineeringNo&nbsp;matter how sophisticated, modern and impenetrable your security system may be, remember that it is only as&nbsp;strong as&nbsp;its weakest link \u2013 which is usually a&nbsp;human. If an employee accidentally plugs a&nbsp;malware-infected USB drive into a&nbsp;company computer, don\u2019t be&nbsp;surprised if a&nbsp;hacker has already infiltrated your internal network. Of course, we&nbsp;can anticipate which technical flaws might [&hellip;]<\/p>\n","protected":false},"author":28,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<p>[et_pb_section fb_built=\"1\" _builder_version=\"4.27.4\" _module_preset=\"default\" use_background_color_gradient=\"on\" background_color_gradient_direction=\"45deg\" background_color_gradient_stops=\"#b01e30 0%|#151c4b 100%\" da_disable_devices=\"off|off|off\" global_colors_info=\"{}\" da_is_popup=\"off\" da_exit_intent=\"off\" da_has_close=\"on\" da_alt_close=\"off\" da_dark_close=\"off\" da_not_modal=\"on\" da_is_singular=\"off\" da_with_loader=\"off\" da_has_shadow=\"on\"][et_pb_row column_structure=\"1_2,1_2\" custom_padding_last_edited=\"on|phone\" module_class=\"cf_hero_section_mobile\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"#FFFFFF\" width=\"100%\" width_tablet=\"90%\" width_phone=\"90%\" width_last_edited=\"on|tablet\" custom_padding=\"48px||48px|48px|true|false\" custom_padding_tablet=\"48px||48px|48px|true|false\" custom_padding_phone=\"48px|24px|48px|24px|true|false\" border_radii=\"on|10px|10px|10px|10px\" box_shadow_style=\"preset1\" global_colors_info=\"{}\"][et_pb_column type=\"1_2\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" header_text_color=\"#151C4B\" header_font_size=\"3em\" header_line_height=\"1.2em\" header_2_font=\"|700|||||||\" header_2_text_color=\"#151C4B\" header_3_text_align=\"center\" custom_margin=\"||10px||false|false\" custom_padding=\"||||false|false\" global_colors_info=\"{}\"]<\/p><h1 class=\"n-heading-primary u-mb-small\">Testy Socjotechniczne<\/h1><p>[\/et_pb_text][et_pb_divider color=\"#B01E30\" divider_weight=\"5px\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"25%\" module_alignment=\"left\" global_colors_info=\"{}\"][\/et_pb_divider][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" header_4_font=\"Raleway|500|||||||\" header_4_text_color=\"#485060\" header_4_font_size=\"1.2em\" header_4_line_height=\"1.4em\" global_colors_info=\"{}\"]<\/p><h4>Niezale\u017cnie od\u00a0tego, jak wyrafinowany, nowoczesny i\u00a0nieprzepuszczalny jest Tw\u00f3j\u00a0system bezpiecze\u0144stwa, pami\u0119taj, \u017ce\u00a0jest on\u00a0tak\u00a0silny, jak jego najs\u0142absze ogniwo \u2013 a\u00a0najcz\u0119\u015bciej jest nim cz\u0142owiek. Je\u015bli pracownik przypadkowo pod\u0142\u0105czy do\u00a0firmowego komputera dysk USB zawieraj\u0105cy szkodliwe oprogramowanie, nie\u00a0zdziw si\u0119, gdy\u00a0oka\u017ce si\u0119, \u017ce\u00a0cyberprzest\u0119pca uzyska\u0142 ju\u017c dost\u0119p do\u00a0wewn\u0119trznej sieci. Oczywi\u015bcie mo\u017cemy przewidzie\u0107, jakie luki techniczne w\u00a0systemie mog\u0105 zosta\u0107 znalezione i\u00a0jakich narz\u0119dzi u\u017cyje atakuj\u0105cy, ale\u00a0czy\u00a0jeste\u015bmy w\u00a0stanie przewidzie\u0107 zachowanie cz\u0142owieka, kt\u00f3ry\u00a0padnie ofiar\u0105 sprytnej manipulacji?<\/h4><p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/cyberforces.com\/wp-content\/uploads\/sociotechnology.webp\" title_text=\"sociotechnology\" align=\"center\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"80%\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\"1\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"#EDF2FA\" custom_margin=\"||||false|false\" custom_padding=\"||||false|false\" da_disable_devices=\"off|off|off\" border_radii=\"off||||\" global_colors_info=\"{}\" da_is_popup=\"off\" da_exit_intent=\"off\" da_has_close=\"on\" da_alt_close=\"off\" da_dark_close=\"off\" da_not_modal=\"on\" da_is_singular=\"off\" da_with_loader=\"off\" da_has_shadow=\"on\"][et_pb_row custom_padding_last_edited=\"on|phone\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"#FFFFFF\" width=\"100%\" width_tablet=\"90%\" width_phone=\"90%\" width_last_edited=\"on|tablet\" custom_padding=\"|48px||48px|false|true\" custom_padding_tablet=\"|48px||48px|false|true\" custom_padding_phone=\"|24px||24px|false|false\" border_radii=\"on|10px|10px|10px|10px\" box_shadow_style=\"preset1\" box_shadow_blur=\"10px\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" header_2_font=\"|700|||||||\" header_2_text_color=\"#151C4B\" header_3_text_align=\"center\" custom_margin=\"||10px||false|false\" custom_padding=\"||||false|false\" global_colors_info=\"{}\"]<\/p><h2 style=\"text-align: center;\">Czym s\u0105\u00a0Testy Socjotechniczne?<\/h2><p>[\/et_pb_text][et_pb_divider color=\"#B01E30\" divider_weight=\"5px\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"10%\" module_alignment=\"center\" custom_margin=\"||0px||false|false\" global_colors_info=\"{}\"][\/et_pb_divider][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" text_font=\"Nunito Sans|--et_global_body_font_weight|||||||\" text_text_color=\"#485060\" text_font_size=\"1.2em\" header_2_font=\"|--et_global_heading_font_weight|||||||\" header_2_text_color=\"#151C4B\" header_3_font=\"|--et_global_heading_font_weight|||||||\" header_3_text_color=\"#151C4B\" header_4_text_color=\"#151C4B\" header_4_font_size=\"1em\" header_4_line_height=\"1.2em\" custom_margin=\"||5px||false|false\" global_colors_info=\"{}\"]<\/p><p>Testy socjotechniczne to\u00a0<strong>kontrolowane, symulowane ataki<\/strong>, kt\u00f3re pozwalaj\u0105 sprawdzi\u0107 czujno\u015b\u0107 Twoich\u00a0pracownik\u00f3w oraz\u00a0skuteczno\u015b\u0107 procedur bezpiecze\u0144stwa. W\u00a0ramach takiego testu specjali\u015bci CyberForces pr\u00f3buj\u0105 na\u00a0r\u00f3\u017cne sposoby oszuka\u0107 Tw\u00f3j\u00a0personel \u2013 za\u00a0pomoc\u0105 fa\u0142szywych e-maili, telefon\u00f3w, SMS-\u00f3w, a\u00a0nawet pr\u00f3b fizycznego wej\u015bcia do\u00a0biura. Celem jest zweryfikowanie, czy\u00a0kadra potrafi rozpozna\u0107 zagro\u017cenie i\u00a0w\u0142a\u015bciwie zareagowa\u0107. Zadaj sobie pytania: czy\u00a0szkolisz pracownik\u00f3w, jak broni\u0107 si\u0119 przed\u00a0atakami wymierzonymi w\u00a0ich psychik\u0119? Czy\u00a0wiedz\u0105, jak bezpiecznie weryfikowa\u0107 podejrzane linki i\u00a0za\u0142\u0105czniki? Czy\u00a0s\u0105\u00a0\u015bwiadomi metod, kt\u00f3rymi pos\u0142uguj\u0105 si\u0119 cyberprzest\u0119pcy, by\u00a0ukry\u0107 swoje prawdziwe intencje?<\/p><p>Ataki socjotechniczne stanowi\u0105 dzi\u015b najprostszy i\u00a0najskuteczniejszy spos\u00f3b na\u00a0obej\u015bcie nawet zaawansowanych zabezpiecze\u0144 technicznych. Ich si\u0142a tkwi w\u00a0tym, \u017ce\u00a0cz\u0119sto nie\u00a0wzbudzaj\u0105 podejrze\u0144 ofiary a\u017c\u00a0do\u00a0momentu, gdy\u00a0jest za\u00a0p\u00f3\u017ano. Aby rzetelnie oceni\u0107 odporno\u015b\u0107 Twojej\u00a0organizacji na\u00a0takie zagro\u017cenia, testy socjotechniczne obejmuj\u0105 mo\u017cliwie wiele wektor\u00f3w ataku jednocze\u015bnie. Nasi specjali\u015bci korzystaj\u0105 z\u00a0informacji publicznie dost\u0119pnych (OSINT), a\u00a0tak\u017ce ze\u00a0swojej wiedzy i\u00a0kreatywno\u015bci, aby jak najbardziej realistycznie zasymulowa\u0107 taktyki cyberprzest\u0119pc\u00f3w. Dzi\u0119ki temu dzia\u0142ania testowe s\u0105\u00a0nieprzewidywalne i\u00a0dostarczaj\u0105 wiarygodnych danych o\u00a0ewentualnych podatno\u015bciach <strong>ludzkiego<\/strong> ogniwa zabezpiecze\u0144.<\/p><p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\"1\" admin_label=\"Section\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"#151C4B\" custom_padding=\"20px||||false|false\" da_disable_devices=\"off|off|off\" locked=\"off\" global_colors_info=\"{}\" da_is_popup=\"off\" da_exit_intent=\"off\" da_has_close=\"on\" da_alt_close=\"off\" da_dark_close=\"off\" da_not_modal=\"on\" da_is_singular=\"off\" da_with_loader=\"off\" da_has_shadow=\"on\"][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" header_2_font=\"|700|||||||\" header_2_text_color=\"#FFFFFF\" header_3_text_align=\"center\" custom_margin=\"||10px||false|false\" custom_padding=\"||||false|false\" global_colors_info=\"{}\"]<\/p><h2 style=\"text-align: center;\">Jak Twoja organizacja zyska na\u00a0Testach Socjotechnicznych?<\/h2><p>[\/et_pb_text][et_pb_divider color=\"#B01E30\" divider_weight=\"5px\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"10%\" module_alignment=\"center\" custom_margin=\"||0px||false|false\" global_colors_info=\"{}\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" use_custom_gutter=\"on\" gutter_width=\"2\" make_equal=\"on\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"||||false|false\" custom_padding=\"||10px||false|false\" animation_style=\"fade\" locked=\"off\" global_colors_info=\"{}\" custom_css_main_element_last_edited=\"on|phone\"][et_pb_column type=\"1_2\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"#FFFFFF\" custom_padding=\"24px|24px|24px|24px|true|false\" custom_css_main_element=\"||||||\" border_radii=\"on|10px|10px|10px|10px\" box_shadow_style=\"preset1\" box_shadow_blur=\"10px\" global_colors_info=\"{}\" transform_styles__hover_enabled=\"on|hover\" transform_scale__hover_enabled=\"on|hover\" transform_translate__hover_enabled=\"on|desktop\" transform_rotate__hover_enabled=\"on|desktop\" transform_skew__hover_enabled=\"on|desktop\" transform_origin__hover_enabled=\"on|desktop\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" header_2_font=\"|--et_global_heading_font_weight|||||||\" header_2_text_color=\"#151C4B\" header_3_font=\"|--et_global_heading_font_weight|||||||\" header_3_text_color=\"#151C4B\" custom_margin=\"||0px||false|false\" global_colors_info=\"{}\"]<\/p><div style=\"display: flex; justify-content: space-between; align-items: center;\"><div><h3 class=\"n-heading-secondary u-mb-small\">Jasny obraz faktycznej \u015bwiadomo\u015bci bezpiecze\u0144stwa<\/h3><\/div><div><img style=\"max-width: 80px; vertical-align: middle;\" src=\"https:\/\/cyberforces.com\/wp-content\/uploads\/cyberawareness_2.webp;\" \/><\/div><\/div><p>[\/et_pb_text][et_pb_divider color=\"#B01E30\" divider_weight=\"5px\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"25%\" module_alignment=\"left\" custom_margin=\"||0px||false|false\" custom_padding=\"||0px||false|false\" global_colors_info=\"{}\"][\/et_pb_divider][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" text_text_color=\"#151C4B\" text_font_size=\"1.2em\" global_colors_info=\"{}\"]<\/p><p>Otrzymasz klarowny obraz tego, na\u00a0ile pracownicy faktycznie przestrzegaj\u0105 zasad bezpiecze\u0144stwa i\u00a0rozpoznaj\u0105 ataki, zamiast polega\u0107 wy\u0142\u0105cznie na\u00a0za\u0142o\u017ceniach czy\u00a0odbytej teorii. Taka wiedza pozwoli lepiej ukierunkowa\u0107 dalsze dzia\u0142ania edukacyjne w\u00a0firmie.<\/p><p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"#FFFFFF\" custom_padding=\"24px|24px|24px|24px|true|false\" border_radii=\"on|10px|10px|10px|10px\" box_shadow_style=\"preset1\" box_shadow_blur=\"10px\" global_colors_info=\"{}\" transform_styles__hover_enabled=\"on|hover\" transform_scale__hover_enabled=\"on|hover\" transform_translate__hover_enabled=\"on|desktop\" transform_rotate__hover_enabled=\"on|desktop\" transform_skew__hover_enabled=\"on|desktop\" transform_origin__hover_enabled=\"on|desktop\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" header_2_font=\"|--et_global_heading_font_weight|||||||\" header_2_text_color=\"#151C4B\" header_3_font=\"|--et_global_heading_font_weight|||||||\" header_3_text_color=\"#151C4B\" custom_margin=\"||0px||false|false\" global_colors_info=\"{}\"]<\/p><div style=\"column-gap: 1em; display: flex; justify-content: space-between; align-items: center;\"><div><h3 class=\"n-heading-secondary u-mb-small\">Identyfikacja s\u0142abych punkt\u00f3w zanim zrobi to\u00a0atakuj\u0105cy<\/h3><\/div><div><img style=\"max-width: 80px; vertical-align: middle;\" src=\"https:\/\/cyberforces.com\/wp-content\/uploads\/critical_threat.webp;\" \/><\/div><\/div><p>[\/et_pb_text][et_pb_divider color=\"#B01E30\" divider_weight=\"5px\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"25%\" module_alignment=\"left\" custom_margin=\"||0px||false|false\" custom_padding=\"||0px||false|false\" global_colors_info=\"{}\"][\/et_pb_divider][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" text_text_color=\"#151C4B\" text_font_size=\"1.2em\" global_colors_info=\"{}\"]<\/p><p>Testy wska\u017c\u0105 konkretne s\u0142abe ogniwa \u2013 czy\u00a0jest to\u00a0brak czujno\u015bci, zbyt proste has\u0142a, czy\u00a0omijanie procedur \u2013 kt\u00f3re w\u00a0normalnych warunkach mog\u0142yby zosta\u0107 wykorzystane przez\u00a0prawdziwego napastnika. Dzi\u0119ki temu mo\u017cesz zamkn\u0105\u0107 te\u00a0luki, zanim dojdzie do\u00a0realnego incydentu.<\/p><p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" use_custom_gutter=\"on\" gutter_width=\"2\" make_equal=\"on\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"||||false|false\" custom_padding=\"||10px||false|false\" animation_style=\"fade\" locked=\"off\" global_colors_info=\"{}\" custom_css_main_element_last_edited=\"on|phone\"][et_pb_column type=\"1_2\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"#FFFFFF\" custom_padding=\"24px|24px|24px|24px|true|false\" custom_css_main_element=\"||||||\" border_radii=\"on|10px|10px|10px|10px\" box_shadow_style=\"preset1\" box_shadow_blur=\"10px\" global_colors_info=\"{}\" transform_styles__hover_enabled=\"on|hover\" transform_scale__hover_enabled=\"on|hover\" transform_translate__hover_enabled=\"on|desktop\" transform_rotate__hover_enabled=\"on|desktop\" transform_skew__hover_enabled=\"on|desktop\" transform_origin__hover_enabled=\"on|desktop\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" header_2_font=\"|--et_global_heading_font_weight|||||||\" header_2_text_color=\"#151C4B\" header_3_font=\"|--et_global_heading_font_weight|||||||\" header_3_text_color=\"#151C4B\" custom_margin=\"||0px||false|false\" global_colors_info=\"{}\"]<\/p><div style=\"display: flex; justify-content: space-between; align-items: center;\"><div><h3 class=\"n-heading-secondary u-mb-small\">Podniesienie \u015bwiadomo\u015bci pracownik\u00f3w<\/h3><\/div><div><img style=\"max-width: 80px; vertical-align: middle;\" src=\"https:\/\/cyberforces.com\/wp-content\/uploads\/awareness.webp;\" \/><\/div><\/div><p>[\/et_pb_text][et_pb_divider color=\"#B01E30\" divider_weight=\"5px\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"25%\" module_alignment=\"left\" custom_margin=\"||0px||false|false\" custom_padding=\"||0px||false|false\" global_colors_info=\"{}\"][\/et_pb_divider][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" text_text_color=\"#151C4B\" text_font_size=\"1.2em\" global_colors_info=\"{}\"]<\/p><p>Sam udzia\u0142 firmy w\u00a0takich testach zwi\u0119ksza czujno\u015b\u0107 zespo\u0142u. Pracownicy, kt\u00f3rzy\u00a0zetkn\u0105 si\u0119 z\u00a0kontrolowanym atakiem, lepiej zrozumiej\u0105 zagro\u017cenia i\u00a0stan\u0105 si\u0119 bardziej ostro\u017cni. Pomaga to\u00a0budowa\u0107 kultur\u0119 bezpiecze\u0144stwa w\u00a0organizacji.<\/p><p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"#FFFFFF\" custom_padding=\"24px|24px|24px|24px|true|false\" border_radii=\"on|10px|10px|10px|10px\" box_shadow_style=\"preset1\" box_shadow_blur=\"10px\" global_colors_info=\"{}\" transform_styles__hover_enabled=\"on|hover\" transform_scale__hover_enabled=\"on|hover\" transform_translate__hover_enabled=\"on|desktop\" transform_rotate__hover_enabled=\"on|desktop\" transform_skew__hover_enabled=\"on|desktop\" transform_origin__hover_enabled=\"on|desktop\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" header_2_font=\"|--et_global_heading_font_weight|||||||\" header_2_text_color=\"#151C4B\" header_3_font=\"|--et_global_heading_font_weight|||||||\" header_3_text_color=\"#151C4B\" custom_margin=\"||0px||false|false\" global_colors_info=\"{}\"]<\/p><div style=\"display: flex; justify-content: space-between; align-items: center;\"><div><h3 class=\"n-heading-secondary u-mb-small\">Szczeg\u00f3\u0142owy raport i\u00a0rekomendacje<\/h3><\/div><div><img style=\"max-width: 80px; vertical-align: middle;\" src=\"https:\/\/cyberforces.com\/wp-content\/uploads\/report.webp;\" \/><\/div><\/div><p>[\/et_pb_text][et_pb_divider color=\"#B01E30\" divider_weight=\"5px\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"25%\" module_alignment=\"left\" custom_margin=\"||0px||false|false\" custom_padding=\"||0px||false|false\" global_colors_info=\"{}\"][\/et_pb_divider][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" text_text_color=\"#151C4B\" text_font_size=\"1.2em\" global_colors_info=\"{}\"]<\/p><p>Po\u00a0zako\u0144czeniu test\u00f3w otrzymasz raport z\u00a0opisem przeprowadzonych symulacji, wykrytych podatno\u015bci oraz\u00a0konkretnymi zaleceniami usprawnie\u0144. Dzi\u0119ki temu \u0142atwiej zaplanujesz kolejne kroki \u2013 od\u00a0dodatkowych szkole\u0144 po\u00a0ulepszenie polityk i\u00a0procedur bezpiecze\u0144stwa.<\/p><p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\"1\" disabled_on=\"off|off|off\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"#EDF2FA\" overflow-x=\"hidden\" overflow-y=\"hidden\" custom_margin=\"||0px||false|false\" custom_padding=\"||0px||false|false\" da_disable_devices=\"off|off|off\" global_colors_info=\"{}\" da_is_popup=\"off\" da_exit_intent=\"off\" da_has_close=\"on\" da_alt_close=\"off\" da_dark_close=\"off\" da_not_modal=\"on\" da_is_singular=\"off\" da_with_loader=\"off\" da_has_shadow=\"on\"][et_pb_row _builder_version=\"4.16\" custom_padding=\"|||\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" admin_label=\"Column\" _builder_version=\"4.27.4\" custom_padding=\"|||\" global_colors_info=\"{}\" custom_padding__hover=\"|||\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" header_2_font=\"|700|||||||\" header_2_text_color=\"#151C4B\" header_2_line_height=\"1.2em\" header_3_text_align=\"center\" custom_margin=\"||10px||false|false\" custom_padding=\"||||false|false\" global_colors_info=\"{}\"]<\/p><h2 style=\"text-align: center;\">Proces przeprowadzania test\u00f3w socjotechnicznych<\/h2><p>[\/et_pb_text][et_pb_divider color=\"#B01E30\" divider_weight=\"5px\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"10%\" module_alignment=\"center\" global_colors_info=\"{}\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"90%\" max_width=\"1220px\" custom_padding=\"||||false|false\" animation_style=\"fade\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" module_class=\"divilife-3-col-feature-blurb-slider\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_css_main_element=\"display: flex;||flex-direction: column;\" global_colors_info=\"{}\"][et_pb_blurb title=\"Umowa o poufno\u015bci danych \" image=\"https:\/\/cyberforces.com\/wp-content\/uploads\/01-1.png\" image_icon_width=\"150px\" content_max_width=\"100%\" _builder_version=\"4.27.4\" _module_preset=\"default\" header_text_align=\"center\" header_text_color=\"#151C4B\" header_font_size=\"1em\" body_text_align=\"center\" body_text_color=\"#485060\" body_font_size=\"1.2em\" background_color=\"#FFFFFF\" width=\"90%\" max_width=\"350px\" module_alignment=\"center\" custom_margin=\"||||true|true\" custom_padding=\"25px|25px|25px|25px|true|true\" custom_css_main_element=\" flex: 1;\" border_radii=\"on|10px|10px|10px|10px\" box_shadow_style=\"preset1\" box_shadow_blur=\"10px\" global_colors_info=\"{}\"]<\/p><div class=\"cf_scroll_card\"><p style=\"text-align: center;\">Podpisujemy umow\u0119 o\u00a0poufno\u015bci danych.<\/p><\/div><p>[\/et_pb_blurb][et_pb_blurb title=\"Wywiad\" image=\"https:\/\/cyberforces.com\/wp-content\/uploads\/02.png\" image_icon_width=\"150px\" content_max_width=\"100%\" _builder_version=\"4.27.4\" _module_preset=\"default\" header_text_align=\"center\" header_text_color=\"#151C4B\" header_font_size=\"1em\" body_text_align=\"center\" body_text_color=\"#485060\" body_font_size=\"1.2em\" background_color=\"#FFFFFF\" width=\"90%\" max_width=\"350px\" module_alignment=\"center\" custom_margin=\"||||true|true\" custom_padding=\"25px|25px|25px|25px|true|true\" custom_css_main_element=\" flex: 1;\" border_radii=\"on|10px|10px|10px|10px\" box_shadow_style=\"preset1\" box_shadow_blur=\"10px\" global_colors_info=\"{}\"]<\/p><div class=\"cf_scroll_card\"><p>Przeprowadzamy wywiad z\u00a0klientem, aby zdoby\u0107 informacje o\u00a0firmie, zrozumie\u0107 jej struktur\u0119 oraz\u00a0wyodr\u0119bni\u0107 kluczowe zasoby i\u00a0pracownik\u00f3w.<\/p><\/div><p>[\/et_pb_blurb][et_pb_blurb title=\"Punkty wej\u015bcia\" image=\"https:\/\/cyberforces.com\/wp-content\/uploads\/03.png\" image_icon_width=\"150px\" content_max_width=\"100%\" _builder_version=\"4.27.4\" _module_preset=\"default\" header_text_align=\"center\" header_text_color=\"#151C4B\" header_font_size=\"1em\" body_text_align=\"center\" body_text_color=\"#485060\" body_font_size=\"1.2em\" background_color=\"#FFFFFF\" width=\"90%\" max_width=\"350px\" module_alignment=\"center\" custom_margin=\"||||true|true\" custom_padding=\"25px|25px|25px|25px|true|true\" custom_css_main_element=\" flex: 1;\" border_radii=\"on|10px|10px|10px|10px\" box_shadow_style=\"preset1\" box_shadow_blur=\"10px\" global_colors_info=\"{}\"]<\/p><div class=\"cf_scroll_card\"><p>Mapujemy punkty wej\u015bcia, szukamy luk pos\u0142uguj\u0105c si\u0119 bia\u0142ym wywiadem (np.\u00a0obecno\u015b\u0107 firmy i\u00a0jej pracownik\u00f3w w\u00a0sieci), weryfikujemy wektory ataku i\u00a0ich wykorzystanie podczas przeprowadzania testu.<\/p><\/div><p>[\/et_pb_blurb][et_pb_blurb title=\"Strategia\" image=\"https:\/\/cyberforces.com\/wp-content\/uploads\/04.png\" image_icon_width=\"150px\" content_max_width=\"100%\" _builder_version=\"4.27.4\" _module_preset=\"default\" header_text_align=\"center\" header_text_color=\"#151C4B\" header_font_size=\"1em\" body_text_align=\"center\" body_text_color=\"#485060\" body_font_size=\"1.2em\" background_color=\"#FFFFFF\" width=\"90%\" max_width=\"350px\" module_alignment=\"center\" custom_margin=\"||||true|true\" custom_padding=\"25px|25px|25px|25px|true|true\" custom_css_main_element=\" flex: 1;\" border_radii=\"on|10px|10px|10px|10px\" box_shadow_style=\"preset1\" box_shadow_blur=\"10px\" global_colors_info=\"{}\"]<\/p><div class=\"cf_scroll_card\"><p>Wsp\u00f3lnie z\u00a0klientem opracowujemy scenariusz testu, aby wygl\u0105da\u0142 mo\u017cliwie najbardziej realistycznie.<\/p><\/div><p>[\/et_pb_blurb][et_pb_blurb title=\"Test\" image=\"https:\/\/cyberforces.com\/wp-content\/uploads\/05.png\" image_icon_width=\"150px\" content_max_width=\"100%\" _builder_version=\"4.27.4\" _module_preset=\"default\" header_text_align=\"center\" header_text_color=\"#151C4B\" header_font_size=\"1em\" body_text_align=\"center\" body_text_color=\"#485060\" body_font_size=\"1.2em\" background_color=\"#FFFFFF\" width=\"90%\" max_width=\"350px\" module_alignment=\"center\" custom_margin=\"||||true|true\" custom_padding=\"25px|25px|25px|25px|true|true\" custom_css_free_form=\"||\" border_radii=\"on|10px|10px|10px|10px\" box_shadow_style=\"preset1\" box_shadow_blur=\"10px\" global_colors_info=\"{}\"]<\/p><div class=\"cf_scroll_card\"><p>Przeprowadzamy symulacj\u0119 ataku z\u00a0u\u017cyciem socjotechniki, zgodnie ze\u00a0scenariuszem. Mo\u017ce to\u00a0by\u0107 na\u00a0przyk\u0142ad w\u0142amanie do\u00a0siedziby firmy, albo\u00a0atak zdalny z\u00a0u\u017cyciem techniki spearphishingu.<\/p><\/div><p>[\/et_pb_blurb][et_pb_blurb title=\"Raport\" image=\"https:\/\/cyberforces.com\/wp-content\/uploads\/06.png\" image_icon_width=\"150px\" content_max_width=\"100%\" _builder_version=\"4.27.4\" _module_preset=\"default\" header_text_align=\"center\" header_text_color=\"#151C4B\" header_font_size=\"1em\" body_text_align=\"center\" body_text_color=\"#485060\" body_font_size=\"1.2em\" background_color=\"#FFFFFF\" width=\"90%\" max_width=\"350px\" module_alignment=\"center\" custom_margin=\"||||true|true\" custom_padding=\"25px|25px|25px|25px|true|true\" custom_css_main_element=\" flex: 1;\" border_radii=\"on|10px|10px|10px|10px\" box_shadow_style=\"preset1\" box_shadow_blur=\"10px\" global_colors_info=\"{}\"]<\/p><div class=\"cf_scroll_card\"><p>Przygotowujemy raport pokazuj\u0105cy zasoby, do\u00a0kt\u00f3rych\u00a0uzyskali\u015bmy dost\u0119p, punkty wej\u015bcia i\u00a0wynikaj\u0105ce z\u00a0nich ryzyko biznesowe. Sugerujemy szkolenia dla pracownik\u00f3w.<\/p><\/div><p>[\/et_pb_blurb][et_pb_blurb title=\"Rekomendacje dla klienta\" image=\"https:\/\/cyberforces.com\/wp-content\/uploads\/07.png\" image_icon_width=\"150px\" content_max_width=\"100%\" _builder_version=\"4.27.4\" _module_preset=\"default\" header_text_align=\"center\" header_text_color=\"#151C4B\" header_font_size=\"1em\" body_text_align=\"center\" body_text_color=\"#485060\" body_font_size=\"1.2em\" background_color=\"#FFFFFF\" width=\"90%\" max_width=\"350px\" module_alignment=\"center\" custom_margin=\"||||true|true\" custom_padding=\"25px|25px|25px|25px|true|true\" custom_css_main_element=\" flex: 1;\" border_radii=\"on|10px|10px|10px|10px\" box_shadow_style=\"preset1\" box_shadow_blur=\"10px\" global_colors_info=\"{}\"]<\/p><div class=\"cf_scroll_card\">Sugerujemy, kt\u00f3re warstwy systemu bezpiecze\u0144stwa powinny zosta\u0107 wzmocnione oraz\u00a0jak opracowa\u0107 protoko\u0142y pozwalaj\u0105ce unikn\u0105\u0107 podobnych sytuacji w\u00a0przysz\u0142o\u015bci. Na\u00a0\u017cyczenie klienta przeprowadzamy szkolenia z\u00a0pracownikami.<\/div><p>[\/et_pb_blurb][et_pb_blurb title=\"Retesty\" image=\"https:\/\/cyberforces.com\/wp-content\/uploads\/08.png\" image_icon_width=\"150px\" content_max_width=\"100%\" _builder_version=\"4.27.4\" _module_preset=\"default\" header_text_align=\"center\" header_text_color=\"#151C4B\" header_font_size=\"1em\" body_text_align=\"center\" body_text_color=\"#485060\" body_font_size=\"1.2em\" background_color=\"#FFFFFF\" width=\"90%\" max_width=\"350px\" module_alignment=\"center\" custom_margin=\"||||true|true\" custom_padding=\"25px|25px|25px|25px|true|true\" custom_css_main_element=\" flex: 1;\" border_radii=\"on|10px|10px|10px|10px\" box_shadow_style=\"preset1\" box_shadow_blur=\"10px\" global_colors_info=\"{}\"]<\/p><div class=\"cf_scroll_card\"><p>Zalecamy przeprowadzenie retest\u00f3w, kt\u00f3re zweryfikuj\u0105 skuteczno\u015b\u0107 nowych strategii bezpiecze\u0144stwa, poka\u017c\u0105 klientowi, czy\u00a0\u015bcie\u017cki poprzedniego ataku s\u0105\u00a0nadal mo\u017cliwe do\u00a0wykorzystania oraz\u00a0sprawdz\u0105 inne mo\u017cliwe wektory ataku na\u00a0systemy klienta.<\/p><\/div><p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" width=\"50%\" custom_padding=\"||0px||false|false\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_code admin_label=\"Custom CSS & JS\" _builder_version=\"4.27.4\" _module_preset=\"default\" min_height=\"40px\" hover_enabled=\"0\" global_colors_info=\"{}\" sticky_enabled=\"0\"]<\/p><p><style><!-- [et_pb_line_break_holder] -->.slick-slider {<!-- [et_pb_line_break_holder] -->  -webkit-user-select: none;<!-- [et_pb_line_break_holder] -->  -moz-user-select: none;<!-- [et_pb_line_break_holder] -->  -ms-user-select: none;<!-- [et_pb_line_break_holder] -->  user-select: none;<!-- [et_pb_line_break_holder] -->  -webkit-touch-callout: none;<!-- [et_pb_line_break_holder] -->  -khtml-user-select: none;<!-- [et_pb_line_break_holder] -->  ms-touch-action: pan-y;<!-- [et_pb_line_break_holder] -->  touch-action: pan-y;<!-- [et_pb_line_break_holder] -->  -webkit-tap-highlight-color: transparent;<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] -->.slick-list {<!-- [et_pb_line_break_holder] -->  position: relative;<!-- [et_pb_line_break_holder] -->  display: block;<!-- [et_pb_line_break_holder] -->  overflow-x: hidden;<!-- [et_pb_line_break_holder] -->  margin: 0 0 50px 0;<!-- [et_pb_line_break_holder] -->  padding: 0 0 0px;<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->.slick-track:before, .slick-track:after {<!-- [et_pb_line_break_holder] -->  display: table;<!-- [et_pb_line_break_holder] -->  content: '';<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] -->  <!-- [et_pb_line_break_holder] -->.slick-slide {<!-- [et_pb_line_break_holder] -->  position: relative;<!-- [et_pb_line_break_holder] -->  float: left;<!-- [et_pb_line_break_holder] -->  height: 100%;<!-- [et_pb_line_break_holder] -->  display: flex;<!-- [et_pb_line_break_holder] -->  align-items: stretch;<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] -->  <!-- [et_pb_line_break_holder] -->.divilife-3-col-feature-blurb-slider .slick-arrow, .divilife-3-col-feature-blurb-slider .slick-arrow:hover, .divilife-3-col-feature-blurb-slider .slick-arrow:focus {<!-- [et_pb_line_break_holder] -->position: absolute;<!-- [et_pb_line_break_holder] -->font-size: 0;<!-- [et_pb_line_break_holder] -->line-height: 0;<!-- [et_pb_line_break_holder] -->padding: 0;<!-- [et_pb_line_break_holder] -->color: transparent;<!-- [et_pb_line_break_holder] -->outline: none;<!-- [et_pb_line_break_holder] -->background: #DADBE2;<!-- [et_pb_line_break_holder] -->border: none;<!-- [et_pb_line_break_holder] -->cursor: pointer;<!-- [et_pb_line_break_holder] -->top: 50%;<!-- [et_pb_line_break_holder] -->transform: translateY(-50%);<!-- [et_pb_line_break_holder] -->z-index: 100;<!-- [et_pb_line_break_holder] -->height: 50px;<!-- [et_pb_line_break_holder] -->vertical-align: middle;<!-- [et_pb_line_break_holder] -->border-radius: 50%;<!-- [et_pb_line_break_holder] -->width: 50px;<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] -->.divilife-3-col-feature-blurb-slider .slick-prev { left: -70px; }<!-- [et_pb_line_break_holder] -->.divilife-3-col-feature-blurb-slider .slick-next { right: -70px; }<!-- [et_pb_line_break_holder] -->  <!-- [et_pb_line_break_holder] -->.divilife-3-col-feature-blurb-slider .slick-arrow:before {<!-- [et_pb_line_break_holder] -->font-family: ETmodules;<!-- [et_pb_line_break_holder] -->background: transparent;<!-- [et_pb_line_break_holder] -->opacity: 1;<!-- [et_pb_line_break_holder] -->font-size: 46px;<!-- [et_pb_line_break_holder] -->vertical-align: middle;<!-- [et_pb_line_break_holder] -->\/*color: #151c4b;*\/<!-- [et_pb_line_break_holder] -->color: #ffffff;<!-- [et_pb_line_break_holder] -->text-align: center;<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] -->.divilife-3-col-feature-blurb-slider .slick-arrow:hover:before { opacity: 0.8; }<!-- [et_pb_line_break_holder] -->.divilife-3-col-feature-blurb-slider .slick-prev:before { content: '\\34'; }<!-- [et_pb_line_break_holder] -->.divilife-3-col-feature-blurb-slider .slick-next:before { content: '\\35'; } <!-- [et_pb_line_break_holder] -->  <!-- [et_pb_line_break_holder] -->.entry-content ul.slick-dots {<!-- [et_pb_line_break_holder] -->  position: absolute;<!-- [et_pb_line_break_holder] -->  bottom: 0;<!-- [et_pb_line_break_holder] -->  display: block;<!-- [et_pb_line_break_holder] -->  width: 100%;<!-- [et_pb_line_break_holder] -->  padding: 0;<!-- [et_pb_line_break_holder] -->  margin: 0;<!-- [et_pb_line_break_holder] -->  list-style: none;<!-- [et_pb_line_break_holder] -->  text-align: center;<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] -->.slick-dots li {<!-- [et_pb_line_break_holder] -->  position: relative;<!-- [et_pb_line_break_holder] -->  display: inline-block;<!-- [et_pb_line_break_holder] -->  margin: 0 5px;<!-- [et_pb_line_break_holder] -->  padding: 0;<!-- [et_pb_line_break_holder] -->  cursor: pointer;<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] -->.slick-dots li button {<!-- [et_pb_line_break_holder] -->\tfont-size: 0;<!-- [et_pb_line_break_holder] -->\tline-height: 0;<!-- [et_pb_line_break_holder] -->\tdisplay: block;<!-- [et_pb_line_break_holder] -->\twidth: 10px;<!-- [et_pb_line_break_holder] -->\theight: 10px;<!-- [et_pb_line_break_holder] -->\tpadding: 0;<!-- [et_pb_line_break_holder] -->\tcursor: pointer;<!-- [et_pb_line_break_holder] -->\tcolor: transparent;<!-- [et_pb_line_break_holder] -->\tborder: 0;<!-- [et_pb_line_break_holder] -->\toutline: none;<!-- [et_pb_line_break_holder] -->\tbackground-color: #DADBE2;<!-- [et_pb_line_break_holder] -->  border-radius: 10px;<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] -->.slick-dots li.slick-active button { background-color: #B01E30; }<!-- [et_pb_line_break_holder] -->  <!-- [et_pb_line_break_holder] -->@media(max-width: 980px) {<!-- [et_pb_line_break_holder] -->\t.divilife-3-col-feature-blurb-slider .slick-prev { left: -32px; }<!-- [et_pb_line_break_holder] -->\t.divilife-3-col-feature-blurb-slider .slick-next { right: -30px; }<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] -->@media(max-width: 499px) {<!-- [et_pb_line_break_holder] -->\t.divilife-3-col-feature-blurb-slider .slick-prev { left: -26px; }<!-- [et_pb_line_break_holder] -->\t.divilife-3-col-feature-blurb-slider .slick-next { right: -24px; }<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] -->  <!-- [et_pb_line_break_holder] --><\/style><\/p><p><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] --><script src=\"https:\/\/cdnjs.cloudflare.com\/ajax\/libs\/slick-carousel\/1.6.0\/slick.js\"><\/script><!-- [et_pb_line_break_holder] --><script><!-- [et_pb_line_break_holder] -->jQuery(document).ready(function() {<!-- [et_pb_line_break_holder] -->\tjQuery('.divilife-3-col-feature-blurb-slider').slick({<!-- [et_pb_line_break_holder] -->    dots: true,<!-- [et_pb_line_break_holder] -->    slidesToShow: 3,<!-- [et_pb_line_break_holder] -->    slidesToScroll: 1,<!-- [et_pb_line_break_holder] -->    responsive: [<!-- [et_pb_line_break_holder] -->      {<!-- [et_pb_line_break_holder] -->        breakpoint: 1200,<!-- [et_pb_line_break_holder] -->        settings: {<!-- [et_pb_line_break_holder] -->          slidesToShow: 2<!-- [et_pb_line_break_holder] -->        }<!-- [et_pb_line_break_holder] -->      },<!-- [et_pb_line_break_holder] -->      {<!-- [et_pb_line_break_holder] -->        breakpoint: 767,<!-- [et_pb_line_break_holder] -->        settings: {<!-- [et_pb_line_break_holder] -->          slidesToShow: 1<!-- [et_pb_line_break_holder] -->        }<!-- [et_pb_line_break_holder] -->      }<!-- [et_pb_line_break_holder] -->    ]<!-- [et_pb_line_break_holder] -->  }); <!-- [et_pb_line_break_holder] -->});<!-- [et_pb_line_break_holder] --><\/script>[\/et_pb_code][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\"1\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"#EDF2FA\" custom_margin=\"0px||||false|false\" custom_padding=\"0px||40px||false|false\" da_disable_devices=\"off|off|off\" global_colors_info=\"{}\" da_is_popup=\"off\" da_exit_intent=\"off\" da_has_close=\"on\" da_alt_close=\"off\" da_dark_close=\"off\" da_not_modal=\"on\" da_is_singular=\"off\" da_with_loader=\"off\" da_has_shadow=\"on\"][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" header_2_font=\"|700|||||||\" header_2_text_color=\"#151C4B\" header_3_text_align=\"center\" custom_margin=\"||10px||false|false\" custom_padding=\"||||false|false\" global_colors_info=\"{}\"]<\/p><h2 style=\"text-align: center;\">Rodzaje test\u00f3w socjotechnicznych<\/h2><p>[\/et_pb_text][et_pb_divider color=\"#B01E30\" divider_weight=\"5px\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"10%\" module_alignment=\"center\" custom_margin=\"||0px||false|false\" global_colors_info=\"{}\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" use_custom_gutter=\"on\" gutter_width=\"2\" make_equal=\"on\" _builder_version=\"4.27.4\" _module_preset=\"default\" animation_style=\"fade\" locked=\"off\" global_colors_info=\"{}\" custom_css_main_element_last_edited=\"on|phone\"][et_pb_column type=\"1_2\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"#FFFFFF\" custom_padding=\"12px|24px|12px|24px|true|false\" custom_css_main_element=\"||||||\" border_radii=\"on|10px|10px|10px|10px\" box_shadow_style=\"preset1\" box_shadow_blur=\"10px\" global_colors_info=\"{}\" transform_styles__hover_enabled=\"on|hover\" transform_scale__hover_enabled=\"on|hover\" transform_translate__hover_enabled=\"on|desktop\" transform_rotate__hover_enabled=\"on|desktop\" transform_skew__hover_enabled=\"on|desktop\" transform_origin__hover_enabled=\"on|desktop\" transform_scale__hover=\"105%|105%\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" header_2_font=\"|--et_global_heading_font_weight|||||||\" header_2_text_color=\"#151C4B\" header_3_font=\"|--et_global_heading_font_weight|||||||\" header_3_text_color=\"#151C4B\" custom_margin=\"10px||0px||false|false\" custom_padding=\"||||false|false\" custom_css_before=\"||\" border_color_bottom=\"#B01E30\" global_colors_info=\"{}\"]<\/p><div style=\"display: flex; justify-content: space-between; align-items: center;\"><div><h3 class=\"n-heading-secondary u-mb-small\">Phishing<\/h3><\/div><div><img style=\"max-width: 80px; vertical-align: middle;\" src=\"https:\/\/cyberforces.com\/wp-content\/uploads\/phishing.webp;\" \/><\/div><\/div><p>[\/et_pb_text][et_pb_divider color=\"#B01E30\" divider_weight=\"5px\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"50%\" module_alignment=\"left\" custom_margin=\"||0px||false|false\" custom_padding=\"||0px||false|false\" global_colors_info=\"{}\"][\/et_pb_divider][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" locked=\"off\" global_colors_info=\"{}\"]<\/p><p>Symulacja ataku phishingowego polega na\u00a0wysy\u0142aniu przekonuj\u0105cych, lecz\u00a0fa\u0142szywych wiadomo\u015bci e-mail do\u00a0pracownik\u00f3w. Celem jest sk\u0142onienie odbiorcy do\u00a0klikni\u0119cia w\u00a0z\u0142o\u015bliwy link, pobrania zawirusowanego za\u0142\u0105cznika lub ujawnienia wra\u017cliwych informacji (np.\u00a0hase\u0142). Test phishingowy pokazuje, jak wielu pracownik\u00f3w da si\u0119 nabra\u0107 na\u00a0tak\u0105 pr\u00f3b\u0119 oraz\u00a0czy\u00a0przestrzegaj\u0105 oni firmowych zasad bezpiecze\u0144stwa w\u00a0komunikacji e-mailowej.<\/p><p>[\/et_pb_text][et_pb_button button_url=\"@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjIyNjE1NyJ9fQ==@\" button_text=\"Sprawd\u017a\" button_alignment=\"right\" _builder_version=\"4.27.4\" _dynamic_attributes=\"button_url\" _module_preset=\"default\" custom_button=\"on\" button_text_size=\"12px\" button_text_color=\"#EDF2FA\" button_bg_color=\"#151C4B\" button_border_width=\"3px\" button_border_color=\"#151C4B\" button_border_radius=\"10px\" button_font=\"Nunito Sans|700||on|||||\" button_use_icon=\"off\" custom_margin=\"||15px||false|false\" custom_padding=\"3px|16px|3px|16px|true|true\" button_bg_color_last_edited=\"off|desktop\" global_colors_info=\"{}\" button_bg_color__hover_enabled=\"on|hover\" button_bg_color__hover=\"#FFFFFF\" button_bg_enable_color__hover=\"on\" button_text_color__hover_enabled=\"on|desktop\" button_text_color__hover=\"#151C4B\" button_border_color__hover_enabled=\"on|hover\" button_border_color__hover=\"#151C4B\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"#FFFFFF\" custom_padding=\"12px|24px|12px|24px|true|false\" border_radii=\"on|10px|10px|10px|10px\" box_shadow_style=\"preset1\" box_shadow_blur=\"10px\" global_colors_info=\"{}\" transform_styles__hover_enabled=\"on|hover\" transform_scale__hover=\"105%|105%\" transform_scale__hover_enabled=\"on|hover\" transform_translate__hover_enabled=\"on|desktop\" transform_rotate__hover_enabled=\"on|desktop\" transform_skew__hover_enabled=\"on|desktop\" transform_origin__hover_enabled=\"on|desktop\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" header_2_font=\"|--et_global_heading_font_weight|||||||\" header_2_text_color=\"#151C4B\" header_3_font=\"|--et_global_heading_font_weight|||||||\" header_3_text_color=\"#151C4B\" custom_margin=\"10px||0px||false|false\" global_colors_info=\"{}\"]<\/p><div style=\"display: flex; justify-content: space-between; align-items: center;\"><div><h3 class=\"n-heading-secondary u-mb-small\">Smishing<\/h3><\/div><div><img style=\"max-width: 80px; vertical-align: middle;\" src=\"https:\/\/cyberforces.com\/wp-content\/uploads\/smishing_2.webp;\" \/><\/div><\/div><p>[\/et_pb_text][et_pb_divider color=\"#B01E30\" divider_weight=\"5px\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"50%\" module_alignment=\"left\" custom_margin=\"||0px||false|false\" custom_padding=\"||0px||false|false\" global_colors_info=\"{}\"][\/et_pb_divider][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" locked=\"off\" global_colors_info=\"{}\"]<\/p><p>Ten rodzaj testu wykorzystuje wiadomo\u015bci SMS wysy\u0142ane na\u00a0telefony pracownik\u00f3w. Taka wiadomo\u015b\u0107 podszywa si\u0119 pod\u00a0zaufane \u017ar\u00f3d\u0142o, np.\u00a0bank, kuriera lub inn\u0105 instytucj\u0119, i\u00a0zawiera pro\u015bb\u0119 o\u00a0wykonanie okre\u015blonej akcji (np.\u00a0klikni\u0119cie linku lub podanie kodu). Smishing weryfikuje czujno\u015b\u0107 personelu w\u00a0sytuacji, gdy\u00a0atak przychodzi kana\u0142em mobilnym \u2013 medium cz\u0119sto postrzeganym jako mniej formalne, co\u00a0\u0142atwiej usypia czujno\u015b\u0107 odbiorcy.<\/p><p>[\/et_pb_text][et_pb_button button_url=\"@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjIyNjE3MCJ9fQ==@\" button_text=\"Sprawd\u017a\" button_alignment=\"right\" _builder_version=\"4.27.4\" _dynamic_attributes=\"button_url\" _module_preset=\"default\" custom_button=\"on\" button_text_size=\"12px\" button_text_color=\"#EDF2FA\" button_bg_color=\"#151C4B\" button_border_width=\"3px\" button_border_color=\"#151C4B\" button_border_radius=\"10px\" button_font=\"Nunito Sans|700||on|||||\" button_use_icon=\"off\" custom_margin=\"||15px||false|false\" custom_padding=\"3px|16px|3px|16px|true|true\" button_bg_color_last_edited=\"off|desktop\" global_colors_info=\"{}\" button_bg_color__hover_enabled=\"on|hover\" button_bg_color__hover=\"#FFFFFF\" button_bg_enable_color__hover=\"on\" button_text_color__hover_enabled=\"on|desktop\" button_text_color__hover=\"#151C4B\" button_border_color__hover_enabled=\"on|hover\" button_border_color__hover=\"#151C4B\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" use_custom_gutter=\"on\" gutter_width=\"2\" make_equal=\"on\" _builder_version=\"4.27.4\" _module_preset=\"default\" animation_style=\"fade\" locked=\"off\" global_colors_info=\"{}\" custom_css_main_element_last_edited=\"on|phone\"][et_pb_column type=\"1_2\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"#FFFFFF\" custom_padding=\"12px|24px|12px|24px|true|false\" custom_css_main_element=\"||||||\" border_radii=\"on|10px|10px|10px|10px\" box_shadow_style=\"preset1\" box_shadow_blur=\"10px\" global_colors_info=\"{}\" transform_styles__hover_enabled=\"on|hover\" transform_scale__hover_enabled=\"on|hover\" transform_translate__hover_enabled=\"on|desktop\" transform_rotate__hover_enabled=\"on|desktop\" transform_skew__hover_enabled=\"on|desktop\" transform_origin__hover_enabled=\"on|desktop\" transform_scale__hover=\"105%|105%\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" header_2_font=\"|--et_global_heading_font_weight|||||||\" header_2_text_color=\"#151C4B\" header_3_font=\"|--et_global_heading_font_weight|||||||\" header_3_text_color=\"#151C4B\" custom_margin=\"10px||0px||false|false\" custom_padding=\"||||false|false\" custom_css_before=\"||\" global_colors_info=\"{}\"]<\/p><div style=\"display: flex; justify-content: space-between; align-items: center;\"><div><h3 class=\"n-heading-secondary u-mb-small\">Vishing<\/h3><\/div><div><img style=\"max-width: 80px; vertical-align: middle;\" src=\"https:\/\/cyberforces.com\/wp-content\/uploads\/vishing_2.webp;\" \/><\/div><\/div><p>[\/et_pb_text][et_pb_divider color=\"#B01E30\" divider_weight=\"5px\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"50%\" module_alignment=\"left\" custom_margin=\"||0px||false|false\" custom_padding=\"||0px||false|false\" global_colors_info=\"{}\"][\/et_pb_divider][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" locked=\"off\" global_colors_info=\"{}\"]<\/p><p>Podczas testu vishingowego podejmowana jest kontrolowana pr\u00f3ba wy\u0142udzenia informacji przez\u00a0rozmow\u0119 telefoniczn\u0105. Tester dzwoni do\u00a0wybranych pracownik\u00f3w, podaj\u0105c si\u0119 np.\u00a0za\u00a0cz\u0142onka dzia\u0142u IT, przedstawiciela banku lub inn\u0105 wiarygodn\u0105 osob\u0119. W\u00a0trakcie rozmowy stara si\u0119 nak\u0142oni\u0107 ofiar\u0119 do\u00a0ujawnienia poufnych danych lub wykonania okre\u015blonych dzia\u0142a\u0144 (jak zmiana has\u0142a na\u00a0podyktowane przez\u00a0dzwoni\u0105cego). Test vishing sprawdza, czy\u00a0pracownicy potrafi\u0105 rozpozna\u0107 oszustwo i\u00a0trzymaj\u0105 si\u0119 procedur bezpiecze\u0144stwa tak\u017ce podczas bezpo\u015bredniej rozmowy.<\/p><p>[\/et_pb_text][et_pb_button button_url=\"@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjIyNjE3NyJ9fQ==@\" button_text=\"Sprawd\u017a\" button_alignment=\"right\" _builder_version=\"4.27.4\" _dynamic_attributes=\"button_url\" _module_preset=\"default\" custom_button=\"on\" button_text_size=\"12px\" button_text_color=\"#EDF2FA\" button_bg_color=\"#151C4B\" button_border_width=\"3px\" button_border_color=\"#151C4B\" button_border_radius=\"10px\" button_font=\"Nunito Sans|700||on|||||\" button_use_icon=\"off\" custom_margin=\"||15px||false|false\" custom_padding=\"3px|16px|3px|16px|true|true\" button_bg_color_last_edited=\"off|desktop\" global_colors_info=\"{}\" button_bg_color__hover_enabled=\"on|hover\" button_bg_color__hover=\"#FFFFFF\" button_bg_enable_color__hover=\"on\" button_text_color__hover_enabled=\"on|desktop\" button_text_color__hover=\"#151C4B\" button_border_color__hover_enabled=\"on|hover\" button_border_color__hover=\"#151C4B\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"#FFFFFF\" custom_padding=\"12px|24px|12px|24px|true|false\" border_radii=\"on|10px|10px|10px|10px\" box_shadow_style=\"preset1\" box_shadow_blur=\"10px\" global_colors_info=\"{}\" transform_styles__hover_enabled=\"on|hover\" transform_scale__hover=\"105%|105%\" transform_scale__hover_enabled=\"on|hover\" transform_translate__hover_enabled=\"on|desktop\" transform_rotate__hover_enabled=\"on|desktop\" transform_skew__hover_enabled=\"on|desktop\" transform_origin__hover_enabled=\"on|desktop\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" header_2_font=\"|--et_global_heading_font_weight|||||||\" header_2_text_color=\"#151C4B\" header_3_font=\"|--et_global_heading_font_weight|||||||\" header_3_text_color=\"#151C4B\" custom_margin=\"10px||0px||false|false\" global_colors_info=\"{}\"]<\/p><div style=\"display: flex; justify-content: space-between; align-items: center;\"><div><h3 class=\"n-heading-secondary u-mb-small\">Wej\u015bcia na\u00a0obiekt<\/h3><\/div><div><img style=\"max-width: 80px; vertical-align: middle;\" src=\"https:\/\/cyberforces.com\/wp-content\/uploads\/entries.webp;\" \/><\/div><\/div><p>[\/et_pb_text][et_pb_divider color=\"#B01E30\" divider_weight=\"5px\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"50%\" module_alignment=\"left\" custom_margin=\"||0px||false|false\" custom_padding=\"||0px||false|false\" global_colors_info=\"{}\"][\/et_pb_divider][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" locked=\"off\" global_colors_info=\"{}\"]<\/p><p>Ten test polega na\u00a0fizycznej pr\u00f3bie dostania si\u0119 do\u00a0chronionych pomieszcze\u0144 firmy przez\u00a0osob\u0119 nieuprawnion\u0105. Tester mo\u017ce podawa\u0107 si\u0119 za\u00a0go\u015bcia, kuriera, serwisanta lub nawet pracownika, aby uzyska\u0107 dost\u0119p do\u00a0biura, serwerowni czy\u00a0innych newralgicznych stref. Celem jest sprawdzenie skuteczno\u015bci zabezpiecze\u0144 fizycznych i\u00a0procedur kontroli dost\u0119pu: czy\u00a0kto\u015b obcy mo\u017ce wej\u015b\u0107 bez\u00a0przepustki? Czy\u00a0pracownicy reaguj\u0105 na\u00a0nieznajome osoby w\u00a0strefach zamkni\u0119tych? Czy\u00a0istniej\u0105 luki pozwalaj\u0105ce intruzowi niezauwa\u017cenie dosta\u0107 si\u0119 do\u00a0\u015brodka?<\/p><p>[\/et_pb_text][et_pb_button button_url=\"@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjIyNjE4NiJ9fQ==@\" button_text=\"Sprawd\u017a\" button_alignment=\"right\" _builder_version=\"4.27.4\" _dynamic_attributes=\"button_url\" _module_preset=\"default\" custom_button=\"on\" button_text_size=\"12px\" button_text_color=\"#EDF2FA\" button_bg_color=\"#151C4B\" button_border_width=\"3px\" button_border_color=\"#151C4B\" button_border_radius=\"10px\" button_font=\"Nunito Sans|700||on|||||\" button_use_icon=\"off\" custom_margin=\"||15px||false|false\" custom_padding=\"3px|16px|3px|16px|true|true\" button_bg_color_last_edited=\"off|desktop\" global_colors_info=\"{}\" button_bg_color__hover_enabled=\"on|hover\" button_bg_color__hover=\"#FFFFFF\" button_bg_enable_color__hover=\"on\" button_text_color__hover_enabled=\"on|desktop\" button_text_color__hover=\"#151C4B\" button_border_color__hover_enabled=\"on|hover\" button_border_color__hover=\"#151C4B\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\"1\" _builder_version=\"4.27.4\" _module_preset=\"default\" use_background_color_gradient=\"on\" background_color_gradient_direction=\"45deg\" background_color_gradient_stops=\"#b01e30 0%|#151c4b 100%\" custom_margin=\"||||false|false\" custom_padding=\"20px||20px||false|false\" da_disable_devices=\"off|off|off\" global_colors_info=\"{}\" da_is_popup=\"off\" da_exit_intent=\"off\" da_has_close=\"on\" da_alt_close=\"off\" da_dark_close=\"off\" da_not_modal=\"on\" da_is_singular=\"off\" da_with_loader=\"off\" da_has_shadow=\"on\"][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" header_2_font=\"|--et_global_heading_font_weight|||||||\" header_2_text_color=\"#FFFFFF\" header_2_line_height=\"1.2em\" header_3_font=\"|--et_global_heading_font_weight|||||||\" header_3_text_color=\"#FFFFFF\" custom_margin=\"||||false|false\" locked=\"off\" global_colors_info=\"{}\"]<\/p><h2 class=\"n-heading-secondary u-mb-small\" style=\"text-align: center;\">Skontaktuj si\u0119 z\u00a0nami i\u00a0dowiedz si\u0119 wi\u0119cej<\/h2><p>[\/et_pb_text][et_pb_button button_url=\"#contact\" button_text=\"Skontaktuj si\u0119\" button_alignment=\"center\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_button=\"on\" button_text_size=\"16px\" button_text_color=\"#EDF2FA\" button_bg_color=\"#B01E30\" button_border_width=\"3px\" button_border_color=\"#B01E30\" button_border_radius=\"10px\" button_font=\"Nunito Sans|700||on|||||\" button_use_icon=\"off\" custom_margin=\"||15px||false|false\" custom_padding=\"5px|20px|5px|20px|true|true\" button_bg_color_last_edited=\"off|desktop\" locked=\"off\" global_colors_info=\"{}\" button_bg_color__hover_enabled=\"on|hover\" button_bg_color__hover=\"#FFFFFF\" button_bg_enable_color__hover=\"on\" button_text_color__hover_enabled=\"on|desktop\" button_text_color__hover=\"#151C4B\" button_border_color__hover_enabled=\"on|desktop\" button_border_color__hover=\"#FFFFFF\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\"1\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"#EDF2FA\" da_disable_devices=\"off|off|off\" global_colors_info=\"{}\" da_is_popup=\"off\" da_exit_intent=\"off\" da_has_close=\"on\" da_alt_close=\"off\" da_dark_close=\"off\" da_not_modal=\"on\" da_is_singular=\"off\" da_with_loader=\"off\" da_has_shadow=\"on\"][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" header_2_font=\"|700|||||||\" header_2_text_color=\"#151C4B\" header_3_text_align=\"center\" custom_margin=\"||10px||false|false\" custom_padding=\"||||false|false\" global_colors_info=\"{}\"]<\/p><h2 style=\"text-align: center;\">Cz\u0119sto zadawane pytania<\/h2><p>[\/et_pb_text][et_pb_divider color=\"#B01E30\" divider_weight=\"5px\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"10%\" module_alignment=\"center\" global_colors_info=\"{}\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" use_custom_gutter=\"on\" gutter_width=\"2\" make_equal=\"on\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"#EDF2FA\" width=\"100%\" width_tablet=\"90%\" width_phone=\"90%\" width_last_edited=\"on|tablet\" custom_margin=\"||||false|false\" custom_padding=\"0px||0px||false|false\" border_radii=\"on|10px|10px|10px|10px\" global_colors_info=\"{}\"][et_pb_column type=\"1_2\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_enable_color=\"off\" custom_padding=\"0px|0px|0px|0px|false|false\" custom_css_main_element=\"display: flex;||flex-direction: column;||justify-content: space-between;||\" global_colors_info=\"{}\"][et_pb_accordion open_toggle_text_color=\"#151C4B\" closed_toggle_background_color=\"#FFFFFF\" toggle_icon=\"P||divi||400\" icon_color=\"#151C4B\" use_icon_font_size=\"on\" icon_font_size=\"28px\" module_id=\"cf_accordion\" _builder_version=\"4.27.4\" _module_preset=\"default\" toggle_text_color=\"#151C4B\" toggle_font=\"|--et_global_heading_font_weight|||||||\" toggle_font_size=\"1.5em\" toggle_line_height=\"1.2em\" body_text_color=\"#485060\" body_font_size=\"1.1em\" border_radii=\"on|10px|10px|10px|10px\" border_width_all=\"0px\" box_shadow_style=\"preset1\" box_shadow_blur=\"10px\" box_shadow_color=\"rgba(175,183,194,0.5)\" global_colors_info=\"{}\"][et_pb_accordion_item title=\"Czym jest socjotechnika? \" open=\"on\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p><p>To\u00a0wektor ataku haker\u00f3w maj\u0105cy na\u00a0celu oszukanie u\u017cytkownika (pracownika). Wykorzystuje techniki oszustwa w\u00a0celu zmanipulowania ofiary do\u00a0ujawnienia wra\u017cliwych danych, czy\u00a0nie\u015bwiadomego udzielenia do\u00a0nich dost\u0119pu, poprzez klikni\u0119cie linku, lub pobranie z\u0142o\u015bliwego oprogramowania.<\/p><p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"Jak wygl\u0105da atak socjotechniczny? \" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p><p>Po\u00a0przeprowadzeniu wywiadu z\u00a0klientem, pr\u00f3bujemy sforsowa\u0107 jego zabezpieczenia i\u00a0przeprowadzi\u0107 atak socjotechniczny, kt\u00f3rego\u00a0konsekwencj\u0119 om\u00f3wimy podczas sesji szkoleniowej po\u00a0te\u015bcie.<\/p><p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"Czym jest phishing? \" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p><p>To\u00a0szeroko zakrojona technika wykorzystuj\u0105ca maile i\u00a0wiadomo\u015bci tekstowe by\u00a0nam\u00f3wi\u0107 u\u017cytkownik\u00f3w do\u00a0ujawnienia danych wra\u017cliwych lub pobrania zakamuflowanego z\u0142o\u015bliwego oprogramowania.<\/p><p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_enable_color=\"off\" global_colors_info=\"{}\"][et_pb_accordion open_toggle_text_color=\"#151C4B\" closed_toggle_background_color=\"#FFFFFF\" toggle_icon=\"P||divi||400\" icon_color=\"#151C4B\" use_icon_font_size=\"on\" icon_font_size=\"28px\" module_id=\"cf_accordion\" _builder_version=\"4.27.4\" _module_preset=\"default\" toggle_text_color=\"#151C4B\" toggle_font=\"|--et_global_heading_font_weight|||||||\" toggle_font_size=\"1.5em\" toggle_line_height=\"1.2em\" body_text_color=\"#485060\" body_font_size=\"1.1em\" custom_css_free_form=\".et_pb_accordion .et_pb_toggle_open .et_pb_toggle_title:before {|| display: block!important;|| content: %22%924f%22 !important;|| color: #b01e30;||}||||.et_pb_toggle_open .et_pb_toggle_content::before {|| position: absolute;|| top: 10%;|| content: %22 %22;|| width: 30%;|| background: #B01E30;|| height: 3px;|| left: 0%;|| right: 0%;|| ||}\" border_radii=\"on|10px|10px|10px|10px\" border_width_all=\"0px\" box_shadow_style=\"preset1\" box_shadow_blur=\"10px\" box_shadow_color=\"rgba(175,183,194,0.5)\" global_colors_info=\"{}\"][et_pb_accordion_item title=\"Czym jest baiting?\" open=\"on\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p><p>W\u00a0tym kontek\u015bcie jest to\u00a0trik wykorzystywany przez\u00a0haker\u00f3w do\u00a0uzyskania poufnych danych u\u017cytkownika, takich jak jego numer konta, czy\u00a0ubezpieczenia. W\u00a0tym celu u\u017cywaj\u0105 wiadomo\u015bci zawieraj\u0105cych komunikaty wy\u0142udzaj\u0105ce te\u00a0dane np: oferty specjalne, formularze, nieistniej\u0105ce wygrane itp.<\/p><p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"Jak zapobiega\u0107 phishingowi?\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p><p>Wyczulenie na\u00a0podejrzane zachowanie i\u00a0wysoka \u015bwiadomo\u015b\u0107 zagro\u017cenia to\u00a0podstawa. Pomo\u017ce r\u00f3wnie\u017c wiedza o\u00a0technikach stosowanych do\u00a0wy\u0142udze\u0144.<\/p><p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"Kto mo\u017ce pa\u015b\u0107 ofiar\u0105 atak\u00f3w socjotechnicznych?\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p><p>Absolutnie ka\u017cdy. W\u00a0dobie wszechobecnej cyfryzacji, ka\u017cdy z\u00a0nas posiada zdalny dost\u0119p do\u00a0olbrzymiej ilo\u015bci cennych informacji. Motorem nap\u0119dowym z\u0142owrogiego hakera jest zysk, wi\u0119c\u00a0jego celem cz\u0119sto b\u0119d\u0105 pada\u0107 firmy. Je\u015bli my\u015blisz, \u017ce\u00a0jeste\u015b zbyt ma\u0142\u0105 organizacj\u0105, \u017ceby\u00a0zosta\u0107 zaatakowanym, tylko\u00a0u\u0142atwiasz mu\u00a0spraw\u0119 nie\u00a0dbaj\u0105c o\u00a0swoje bezpiecze\u0144stwo. Ka\u017cdy posiada dane, kt\u00f3re w\u00a0taki czy\u00a0inny spos\u00f3b mo\u017cna spieni\u0119\u017cy\u0107.<\/p><p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\"1\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"#EDF2FA\" custom_margin=\"||||false|false\" custom_padding=\"20px||20px||false|false\" da_disable_devices=\"off|off|off\" border_radii=\"off||||\" global_colors_info=\"{}\" da_is_popup=\"off\" da_exit_intent=\"off\" da_has_close=\"on\" da_alt_close=\"off\" da_dark_close=\"off\" da_not_modal=\"on\" da_is_singular=\"off\" da_with_loader=\"off\" da_has_shadow=\"on\"][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" header_2_font=\"|700|||||||\" header_2_text_color=\"#151C4B\" header_3_text_align=\"center\" custom_margin=\"||10px||false|false\" custom_padding=\"||||false|false\" global_colors_info=\"{}\"]<\/p><h2 style=\"text-align: center;\">Wyce\u0144 projekt<\/h2><p>[\/et_pb_text][et_pb_divider color=\"#B01E30\" divider_weight=\"5px\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"10%\" module_alignment=\"center\" global_colors_info=\"{}\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" use_custom_gutter=\"on\" gutter_width=\"1\" make_equal=\"on\" module_id=\"contact\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"#FFFFFF\" background_enable_color=\"off\" width=\"100%\" width_tablet=\"90%\" width_phone=\"90%\" width_last_edited=\"on|tablet\" custom_margin=\"||75px||false|false\" custom_padding=\"0px||||false|false\" border_radii=\"on|10px|10px|10px|10px\" box_shadow_style=\"preset1\" box_shadow_blur=\"10px\" global_module=\"226612\" global_colors_info=\"{}\"][et_pb_column type=\"1_2\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"#151C4B\" custom_padding=\"0px|0px|0px|0px|false|false\" custom_css_main_element=\"display: flex;||flex-direction: column;||justify-content: space-between;||\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" header_4_text_color=\"#FFFFFF\" header_4_font_size=\"24px\" custom_margin=\"||10px||false|false\" custom_padding=\"48px|||48px|false|false\" global_colors_info=\"{}\"]<\/p><h4>Dane kontaktowe<\/h4><p>[\/et_pb_text][et_pb_divider color=\"#B01E30\" divider_weight=\"5px\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"20%\" module_alignment=\"left\" custom_margin=\"||0px||false|false\" custom_padding=\"|||48px|false|false\" global_colors_info=\"{}\"][\/et_pb_divider][et_pb_code _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"24px||24px|48px|false|false\" custom_css_free_form=\".contact-item {|| display: flex;|| align-items: center;|| margin-bottom: 15px;|| color: white;|| font-size: 1.2em;||}||||\/*.contact-item .et-pb-icon {|| font-size: 28px;|| color: #B01E30;|| margin-right: 12px;|| font-weight: bold;||}*\/||||.contact-item a\u00a0{|| color: white;|| text-decoration: none;||}||||.contact-item a:hover {|| text-decoration: underline;||}||||.address {|| align-items: flex-start;||}||||.address-details {|| display: flex;|| flex-direction: column;||}||\" global_colors_info=\"{}\"]<\/p><div class=\"contact-container\"><p><!-- [et_pb_line_break_holder] --><\/p><div class=\"contact-item\"><!-- [et_pb_line_break_holder] --> <span class=\"et-pb-icon\">\ue010<!-- [et_pb_line_break_holder] --> <\/span><!-- [et_pb_line_break_holder] --> <a href=\"mailto:info@cyberforces.com\">info@cyberforces.com<\/a><!-- [et_pb_line_break_holder] --><\/div><p><!-- [et_pb_line_break_holder] --><\/p><div class=\"contact-item\"><!-- [et_pb_line_break_holder] --> <span class=\"et-pb-icon\">\ue00b<!-- [et_pb_line_break_holder] --> <\/span><!-- [et_pb_line_break_holder] --> +48 505 372 810<!-- [et_pb_line_break_holder] --> <!-- [et_pb_line_break_holder] --><\/div><p><!-- [et_pb_line_break_holder] --><\/p><div class=\"contact-item address\"><p><!-- [et_pb_line_break_holder] --> <span class=\"et-pb-icon\">\ue0ef<!-- [et_pb_line_break_holder] --> <\/span><!-- [et_pb_line_break_holder] --><\/p><div class=\"address-details\"><!-- [et_pb_line_break_holder] --> TestArmy Group S.A.<!-- [et_pb_line_break_holder] --> <!-- [et_pb_line_break_holder] --> ul.\u00a0Petuniowa 9\/5<!-- [et_pb_line_break_holder] --> <!-- [et_pb_line_break_holder] --> 53-238 Wroc\u0142aw<!-- [et_pb_line_break_holder] --> <!-- [et_pb_line_break_holder] --> Polska<!-- [et_pb_line_break_holder] --> <!-- [et_pb_line_break_holder] --><\/div><p><!-- [et_pb_line_break_holder] --><\/p><\/div><p><!-- [et_pb_line_break_holder] --><\/p><\/div><p>[\/et_pb_code][et_pb_image src=\"https:\/\/cyberforces.com\/wp-content\/uploads\/cf_team.webp\" title_text=\"cf_team\" show_bottom_space=\"off\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"||||false|false\" custom_padding=\"||||false|false\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"#FFFFFF\" global_colors_info=\"{}\"][et_pb_contact_form captcha=\"off\" email=\"katarzyna.wojcik@testarmy.com, info@cyberforces.com\" custom_message=\"Nowa wiadomo\u015b\u0107:||et_pb_line_break_holder||||et_pb_line_break_holder||Imi\u0119 i nazwisko: %%Name%%||et_pb_line_break_holder||Telefon: %%Phone%%||et_pb_line_break_holder||Email: %%Email%%||et_pb_line_break_holder||Firma: %%Company%%||et_pb_line_break_holder||Wiadomo\u015b\u0107: %%Message%%\" success_message=\"Dzi\u0119kujemy! Twoja wiadomo\u015b\u0107 zosta\u0142a wys\u0142ana.\" submit_button_text=\"Wy\u015blij\" _builder_version=\"4.27.4\" _module_preset=\"default\" _unique_id=\"c7bf614e-40dc-4f51-a574-09da4b946dfc\" form_field_background_color=\"RGBA(255,255,255,0)\" form_field_text_color=\"#151C4B\" form_field_focus_background_color=\"#EDF2FA\" form_field_focus_text_color=\"#151C4B\" custom_button=\"on\" button_text_size=\"16px\" button_text_color=\"#EDF2FA\" button_bg_color=\"#B01E30\" button_border_width=\"3px\" button_border_color=\"#B01E30\" button_border_radius=\"10px\" button_font=\"Nunito Sans|700||on|||||\" button_use_icon=\"off\" module_alignment=\"center\" custom_padding=\"48px|48px|48px|48px|false|true\" border_width_bottom=\"1px\" border_color_bottom=\"#151C4B\" global_colors_info=\"{}\" button_text_color__hover=\"#B01E30\" button_text_color__hover_enabled=\"on|desktop\" button_bg_color__hover=\"#FFFFFF\" button_bg_color__hover_enabled=\"on|hover\" button_border_color__hover=\"#B01E30\" button_border_color__hover_enabled=\"on|hover\"][et_pb_contact_field field_id=\"Name\" field_title=\"Imi\u0119\" fullwidth_field=\"on\" _builder_version=\"4.27.4\" global_colors_info=\"{}\" button_text_size__hover_enabled=\"off\" button_one_text_size__hover_enabled=\"off\" button_two_text_size__hover_enabled=\"off\" button_text_color__hover_enabled=\"off\" button_one_text_color__hover_enabled=\"off\" button_two_text_color__hover_enabled=\"off\" button_border_width__hover_enabled=\"off\" button_one_border_width__hover_enabled=\"off\" button_two_border_width__hover_enabled=\"off\" button_border_color__hover_enabled=\"off\" button_one_border_color__hover_enabled=\"off\" button_two_border_color__hover_enabled=\"off\" button_border_radius__hover_enabled=\"off\" button_one_border_radius__hover_enabled=\"off\" button_two_border_radius__hover_enabled=\"off\" button_letter_spacing__hover_enabled=\"off\" button_one_letter_spacing__hover_enabled=\"off\" button_two_letter_spacing__hover_enabled=\"off\" button_bg_color__hover_enabled=\"off\" button_one_bg_color__hover_enabled=\"off\" button_two_bg_color__hover_enabled=\"off\"][\/et_pb_contact_field][et_pb_contact_field field_id=\"Company\" field_title=\"Firma\" fullwidth_field=\"on\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_contact_field][et_pb_contact_field field_id=\"Email\" field_title=\"Adres e-mail\" field_type=\"email\" fullwidth_field=\"on\" _builder_version=\"4.27.4\" global_colors_info=\"{}\" button_text_size__hover_enabled=\"off\" button_one_text_size__hover_enabled=\"off\" button_two_text_size__hover_enabled=\"off\" button_text_color__hover_enabled=\"off\" button_one_text_color__hover_enabled=\"off\" button_two_text_color__hover_enabled=\"off\" button_border_width__hover_enabled=\"off\" button_one_border_width__hover_enabled=\"off\" button_two_border_width__hover_enabled=\"off\" button_border_color__hover_enabled=\"off\" button_one_border_color__hover_enabled=\"off\" button_two_border_color__hover_enabled=\"off\" button_border_radius__hover_enabled=\"off\" button_one_border_radius__hover_enabled=\"off\" button_two_border_radius__hover_enabled=\"off\" button_letter_spacing__hover_enabled=\"off\" button_one_letter_spacing__hover_enabled=\"off\" button_two_letter_spacing__hover_enabled=\"off\" button_bg_color__hover_enabled=\"off\" button_one_bg_color__hover_enabled=\"off\" button_two_bg_color__hover_enabled=\"off\"][\/et_pb_contact_field][et_pb_contact_field field_id=\"Phone\" field_title=\"Telefon\" fullwidth_field=\"on\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_contact_field][et_pb_contact_field field_id=\"Message\" field_title=\"Wiadomo\u015b\u0107\" field_type=\"text\" fullwidth_field=\"on\" _builder_version=\"4.27.4\" global_colors_info=\"{}\" button_text_size__hover_enabled=\"off\" button_one_text_size__hover_enabled=\"off\" button_two_text_size__hover_enabled=\"off\" button_text_color__hover_enabled=\"off\" button_one_text_color__hover_enabled=\"off\" button_two_text_color__hover_enabled=\"off\" button_border_width__hover_enabled=\"off\" button_one_border_width__hover_enabled=\"off\" button_two_border_width__hover_enabled=\"off\" button_border_color__hover_enabled=\"off\" button_one_border_color__hover_enabled=\"off\" button_two_border_color__hover_enabled=\"off\" button_border_radius__hover_enabled=\"off\" button_one_border_radius__hover_enabled=\"off\" button_two_border_radius__hover_enabled=\"off\" button_letter_spacing__hover_enabled=\"off\" button_one_letter_spacing__hover_enabled=\"off\" button_two_letter_spacing__hover_enabled=\"off\" button_bg_color__hover_enabled=\"off\" button_one_bg_color__hover_enabled=\"off\" button_two_bg_color__hover_enabled=\"off\"][\/et_pb_contact_field][et_pb_contact_field field_id=\"GDPR\" field_type=\"checkbox\" checkbox_options=\"%91{%22value%22:%22Wyra\u017cam zgod\u0119 na\u00a0przetwarzanie danych osobowych przez\u00a0Testarmy Group S.A. w\u00a0celach marketingowych oraz\u00a0wyra\u017cam zgod\u0119 na\u00a0przesy\u0142anie mi\u00a0drog\u0105 elektroniczn\u0105 lub telefoniczn\u0105 informacji handlowych. Zgoda mo\u017ce zosta\u0107 w\u00a0ka\u017cdym czasie cofni\u0119ta. *%22,%22checked%22:0,%22dragID%22:-1}%93\" fullwidth_field=\"on\" _builder_version=\"4.27.4\" _module_preset=\"default\" form_field_text_color=\"#485060\" custom_css_free_form=\".et_pb_contact_field_options_title {|| display: none!important;||} \" border_width_all=\"1px\" border_color_all=\"#485060\" global_colors_info=\"{}\"][\/et_pb_contact_field][et_pb_contact_field field_id=\"Polityka_Prywatno\u015bci\" field_type=\"checkbox\" checkbox_options=\"%91{%22value%22:%22Zapozna\u0142em\/\u0142am si\u0119 z\u00a0polityk\u0105 prywatno\u015bci i\u00a0zawartymi w\u00a0niej klauzulami i\u00a0akceptuj\u0119 jej postanowienia. *%22,%22checked%22:0,%22dragID%22:-1}%93\" fullwidth_field=\"on\" _builder_version=\"4.27.4\" _module_preset=\"default\" form_field_text_color=\"#485060\" border_width_all=\"1px\" border_color_all=\"#485060\" global_colors_info=\"{}\"][\/et_pb_contact_field][\/et_pb_contact_form][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-252388","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Social Engineering - CyberForces<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberforces.com\/testy-socjotechniczne\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Social Engineering - CyberForces\" \/>\n<meta property=\"og:description\" content=\"Social EngineeringNo&nbsp;matter how sophisticated, modern and impenetrable your security system may be, remember that it is only as&nbsp;strong as&nbsp;its weakest link \u2013 which is usually a&nbsp;human. If an employee accidentally plugs a&nbsp;malware-infected USB drive into a&nbsp;company computer, don\u2019t be&nbsp;surprised if a&nbsp;hacker has already infiltrated your internal network. Of course, we&nbsp;can anticipate which technical flaws might [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberforces.com\/testy-socjotechniczne\" \/>\n<meta property=\"og:site_name\" content=\"CyberForces\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TestArmyCyberForces\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-31T23:25:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyberforces.com\/wp-content\/uploads\/cyberawareness_2.webp;\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cyberforces.com\/testy-socjotechniczne\",\"url\":\"https:\/\/cyberforces.com\/testy-socjotechniczne\",\"name\":\"Social Engineering - CyberForces\",\"isPartOf\":{\"@id\":\"https:\/\/cyberforces.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cyberforces.com\/testy-socjotechniczne#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cyberforces.com\/testy-socjotechniczne#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/cyberawareness_2.webp;\",\"datePublished\":\"2025-05-18T21:48:46+00:00\",\"dateModified\":\"2025-05-31T23:25:57+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cyberforces.com\/testy-socjotechniczne#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cyberforces.com\/testy-socjotechniczne\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyberforces.com\/testy-socjotechniczne#primaryimage\",\"url\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/cyberawareness_2.webp;\",\"contentUrl\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/cyberawareness_2.webp;\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cyberforces.com\/testy-socjotechniczne#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/cyberforces.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Social Engineering\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cyberforces.com\/#website\",\"url\":\"https:\/\/cyberforces.com\/\",\"name\":\"CyberForces\",\"description\":\"Testy bezpiecze\u0144stwa z TestArmy CyberForces. Testy penetracyjne, hackowanie aplikacji webowych i mobilnych, testy socjotechniczne. Dowiedz si\u0119 wi\u0119cej!\",\"publisher\":{\"@id\":\"https:\/\/cyberforces.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cyberforces.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cyberforces.com\/#organization\",\"name\":\"TestArmy Group S. A.\",\"url\":\"https:\/\/cyberforces.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png\",\"contentUrl\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png\",\"width\":1210,\"height\":173,\"caption\":\"TestArmy Group S. A.\"},\"image\":{\"@id\":\"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/TestArmyCyberForces\/\",\"https:\/\/www.linkedin.com\/company\/cyberforcescom\/\",\"https:\/\/www.instagram.com\/cyberforces__\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Social Engineering - CyberForces","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberforces.com\/testy-socjotechniczne","og_locale":"en_US","og_type":"article","og_title":"Social Engineering - CyberForces","og_description":"Social EngineeringNo&nbsp;matter how sophisticated, modern and impenetrable your security system may be, remember that it is only as&nbsp;strong as&nbsp;its weakest link \u2013 which is usually a&nbsp;human. If an employee accidentally plugs a&nbsp;malware-infected USB drive into a&nbsp;company computer, don\u2019t be&nbsp;surprised if a&nbsp;hacker has already infiltrated your internal network. Of course, we&nbsp;can anticipate which technical flaws might [&hellip;]","og_url":"https:\/\/cyberforces.com\/testy-socjotechniczne","og_site_name":"CyberForces","article_publisher":"https:\/\/www.facebook.com\/TestArmyCyberForces\/","article_modified_time":"2025-05-31T23:25:57+00:00","og_image":[{"url":"https:\/\/cyberforces.com\/wp-content\/uploads\/cyberawareness_2.webp;","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cyberforces.com\/testy-socjotechniczne","url":"https:\/\/cyberforces.com\/testy-socjotechniczne","name":"Social Engineering - CyberForces","isPartOf":{"@id":"https:\/\/cyberforces.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyberforces.com\/testy-socjotechniczne#primaryimage"},"image":{"@id":"https:\/\/cyberforces.com\/testy-socjotechniczne#primaryimage"},"thumbnailUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/cyberawareness_2.webp;","datePublished":"2025-05-18T21:48:46+00:00","dateModified":"2025-05-31T23:25:57+00:00","breadcrumb":{"@id":"https:\/\/cyberforces.com\/testy-socjotechniczne#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberforces.com\/testy-socjotechniczne"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberforces.com\/testy-socjotechniczne#primaryimage","url":"https:\/\/cyberforces.com\/wp-content\/uploads\/cyberawareness_2.webp;","contentUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/cyberawareness_2.webp;"},{"@type":"BreadcrumbList","@id":"https:\/\/cyberforces.com\/testy-socjotechniczne#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/cyberforces.com\/"},{"@type":"ListItem","position":2,"name":"Social Engineering"}]},{"@type":"WebSite","@id":"https:\/\/cyberforces.com\/#website","url":"https:\/\/cyberforces.com\/","name":"CyberForces","description":"Testy bezpiecze\u0144stwa z TestArmy CyberForces. Testy penetracyjne, hackowanie aplikacji webowych i mobilnych, testy socjotechniczne. Dowiedz si\u0119 wi\u0119cej!","publisher":{"@id":"https:\/\/cyberforces.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberforces.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cyberforces.com\/#organization","name":"TestArmy Group S. A.","url":"https:\/\/cyberforces.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/","url":"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png","contentUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png","width":1210,"height":173,"caption":"TestArmy Group S. A."},"image":{"@id":"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/TestArmyCyberForces\/","https:\/\/www.linkedin.com\/company\/cyberforcescom\/","https:\/\/www.instagram.com\/cyberforces__"]}]}},"_links":{"self":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/pages\/252388","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/users\/28"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/comments?post=252388"}],"version-history":[{"count":8,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/pages\/252388\/revisions"}],"predecessor-version":[{"id":253220,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/pages\/252388\/revisions\/253220"}],"wp:attachment":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/media?parent=252388"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}