{"id":252412,"date":"2025-05-19T00:20:43","date_gmt":"2025-05-18T22:20:43","guid":{"rendered":"https:\/\/cyberforces.com\/?page_id=252412"},"modified":"2025-05-19T00:20:48","modified_gmt":"2025-05-18T22:20:48","slug":"vishing","status":"publish","type":"page","link":"https:\/\/cyberforces.com\/en\/vishing","title":{"rendered":"Vishing"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#B01E30&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_direction=&#8221;45deg&#8221; background_color_gradient_stops=&#8221;#b01e30 0%|#641d3e 100%&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row column_structure=&#8221;2_5,3_5&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; width=&#8221;100%&#8221; width_tablet=&#8221;90%&#8221; width_phone=&#8221;90%&#8221; width_last_edited=&#8221;on|tablet&#8221; custom_padding=&#8221;48px||48px|48px|true|false&#8221; custom_css_main_element=&#8221;display: flex;||align-items: center;&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/cyberforces.com\/wp-content\/uploads\/vishing_2.webp&#8221; title_text=&#8221;vishing_2&#8243; align=&#8221;center&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|48px|||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#151C4B&#8221; header_font_size=&#8221;3em&#8221; header_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_color=&#8221;#151C4B&#8221; header_2_line_height=&#8221;1.2em&#8221; header_3_text_align=&#8221;center&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h1 class=\"n-heading-primary u-mb-small\">Vishing<\/h1>\n<h2 class=\"n-heading-primary u-mb-small\">Testing Resilience Against Voice Phishing Attacks<\/h2>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#B01E30&#8243; divider_weight=&#8221;5px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;25%&#8221; module_alignment=&#8221;left&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_4_font=&#8221;Raleway|500|||||||&#8221; header_4_text_color=&#8221;#485060&#8243; header_4_font_size=&#8221;1.2em&#8221; header_4_line_height=&#8221;1.4em&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h4>Can your employees detect voice-based manipulation? Vishing (voice phishing) is a social engineering method where attackers impersonate IT staff, managers, banks, or institutions to extract information. Vishing tests help assess how vulnerable your organization is to such threats while raising employee awareness and improving their ability to recognize manipulation.<\/h4>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#EDF2FA&#8221; custom_padding=&#8221;||||false|false&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_color=&#8221;#151C4B&#8221; header_2_line_height=&#8221;1.2em&#8221; header_3_text_align=&#8221;center&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2 style=\"text-align: center;\">What are the benefits of Vishing Tests?<\/h2>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#B01E30&#8243; divider_weight=&#8221;5px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;10%&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;0px||||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; custom_css_main_element_last_edited=&#8221;on|phone&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; custom_padding=&#8221;12px|24px|12px|24px|true|false&#8221; animation_style=&#8221;fade&#8221; animation_direction=&#8221;left&#8221; custom_css_main_element=&#8221;||||||&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;10px&#8221; global_colors_info=&#8221;{}&#8221; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; header_2_text_color=&#8221;#151C4B&#8221; header_3_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; header_3_text_color=&#8221;#151C4B&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; hover_enabled=&#8221;0&#8243; custom_css_before=&#8221;||&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<div style=\"display: flex; justify-content: space-between; align-items: center; column-gap: 2em\">\n<div>\n<h3 class=\"n-heading-secondary u-mb-small\">Identifying weaknesses in communication protocols <\/h3>\n<\/div>\n<div><img decoding=\"async\" src=\"https:\/\/cyberforces.com\/wp-content\/uploads\/critical_threat.webp;\" style=\"max-width:80px; vertical-align: middle;\"><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#B01E30&#8243; divider_weight=&#8221;5px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;25%&#8221; module_alignment=&#8221;left&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#485060&#8243; text_font_size=&#8221;1em&#8221; custom_margin=&#8221;||10px||false|false&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>\u2013 we assess whether employees disclose confidential information over the phone to unauthorized individuals.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; custom_padding=&#8221;12px|24px|12px|24px|true|false&#8221; animation_style=&#8221;fade&#8221; animation_direction=&#8221;right&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;10px&#8221; global_colors_info=&#8221;{}&#8221; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; header_2_text_color=&#8221;#151C4B&#8221; header_3_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; header_3_text_color=&#8221;#151C4B&#8221; custom_margin=&#8221;||0px||false|false&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<div style=\"display: flex; justify-content: space-between; align-items: center;\">\n<div>\n<h3 class=\"n-heading-secondary u-mb-small\">Preventing identity theft and financial fraud<\/h3>\n<\/div>\n<div><img decoding=\"async\" style=\"max-width: 80px; vertical-align: middle;\" src=\"https:\/\/cyberforces.com\/wp-content\/uploads\/data_protection.webp;\" \/><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#B01E30&#8243; divider_weight=&#8221;5px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;25%&#8221; module_alignment=&#8221;left&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#485060&#8243; text_font_size=&#8221;1em&#8221; custom_margin=&#8221;||10px||false|false&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>\u2013 vishing is used to steal identities, hijack accounts, or trick employees into transferring funds.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; custom_css_main_element_last_edited=&#8221;on|phone&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; custom_padding=&#8221;12px|24px|12px|24px|true|false&#8221; animation_style=&#8221;fade&#8221; animation_direction=&#8221;bottom&#8221; custom_css_main_element=&#8221;||||||&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;10px&#8221; global_colors_info=&#8221;{}&#8221; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; header_2_text_color=&#8221;#151C4B&#8221; header_3_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; header_3_text_color=&#8221;#151C4B&#8221; custom_margin=&#8221;||0px||false|false&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<div style=\"display: flex; justify-content: space-between; align-items: center;\">\n<div>\n<h3 class=\"n-heading-secondary u-mb-small\">Raising threat awareness<\/h3>\n<\/div>\n<div><img decoding=\"async\" style=\"max-width: 80px; vertical-align: middle;\" src=\"https:\/\/cyberforces.com\/wp-content\/uploads\/cyberawareness_2.webp;\" \/><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#B01E30&#8243; divider_weight=&#8221;5px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;25%&#8221; module_alignment=&#8221;left&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#485060&#8243; text_font_size=&#8221;1em&#8221; custom_margin=&#8221;||10px||false|false&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>\u2013 employees learn to recognize voice scams and apply proper response procedures.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; custom_padding=&#8221;12px|24px|12px|24px|true|false&#8221; animation_style=&#8221;fade&#8221; animation_direction=&#8221;bottom&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;10px&#8221; global_colors_info=&#8221;{}&#8221; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; header_2_text_color=&#8221;#151C4B&#8221; header_3_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; header_3_text_color=&#8221;#151C4B&#8221; custom_margin=&#8221;||0px||false|false&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<div style=\"display: flex; justify-content: space-between; align-items: center; column-gap: 1em;\">\n<div>\n<h3 class=\"n-heading-secondary u-mb-small\">Strengthening security policies<\/h3>\n<\/div>\n<div><img decoding=\"async\" style=\"max-width: 80px; vertical-align: middle;\" src=\"https:\/\/cyberforces.com\/wp-content\/uploads\/report.webp;\" \/><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#B01E30&#8243; divider_weight=&#8221;5px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;25%&#8221; module_alignment=&#8221;left&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#485060&#8243; text_font_size=&#8221;1em&#8221; custom_margin=&#8221;||10px||false|false&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>\u2013 we provide recommendations on verifying caller identity and managing suspicious calls.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#151C4B&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_direction=&#8221;45deg&#8221; background_color_gradient_stops=&#8221;#b01e30 0%|#151c4b 100%&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; da_disable_devices=&#8221;off|off|off&#8221; border_radii=&#8221;off||||&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; width=&#8221;100%&#8221; width_tablet=&#8221;90%&#8221; width_phone=&#8221;90%&#8221; width_last_edited=&#8221;on|tablet&#8221; custom_padding=&#8221;|48px||48px|false|true&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;10px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_color=&#8221;#151C4B&#8221; header_3_text_align=&#8221;center&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2 style=\"text-align: center;\">What is Vishing and how does it work?<\/h2>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#B01E30&#8243; divider_weight=&#8221;5px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;10%&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Nunito Sans|&#8211;et_global_body_font_weight|||||||&#8221; text_text_color=&#8221;#485060&#8243; text_font_size=&#8221;1.2em&#8221; header_2_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; header_2_text_color=&#8221;#151C4B&#8221; header_3_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; header_3_text_color=&#8221;#151C4B&#8221; header_4_text_color=&#8221;#151C4B&#8221; header_4_font_size=&#8221;1em&#8221; header_4_line_height=&#8221;1.2em&#8221; custom_margin=&#8221;||15px||false|false&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p style=\"text-align: center;\">\u00a0<strong>Vishing<\/strong> (voice phishing) is a technique in which attackers use phone calls to manipulate victims into revealing sensitive information or taking unauthorized actions.<\/p>\n<p>[\/et_pb_text][et_pb_tabs active_tab_background_color=&#8221;#EDF2FA&#8221; inactive_tab_background_color=&#8221;#AFB7C2&#8243; active_tab_text_color=&#8221;#151C4B&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; tab_text_color=&#8221;#485060&#8243; body_font=&#8221;Nunito Sans||||||||&#8221; body_text_color=&#8221;#485060&#8243; body_font_size=&#8221;1.2em&#8221; tab_font=&#8221;&#8211;et_global_heading_font|700|||||||&#8221; tab_font_size=&#8221;1.1em&#8221; background_color=&#8221;#EDF2FA&#8221; hover_enabled=&#8221;0&#8243; custom_css_free_form=&#8221;ul.et_pb_tabs_controls::after {||  border-top: none !important;&#8221; custom_css_tabs_controls=&#8221;background-color: #ffffff !important;&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; border_width_all=&#8221;0px&#8221; global_colors_info=&#8221;{}&#8221; custom_css_tabs_controls__hover_enabled=&#8221;off|desktop&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;][et_pb_tab title=&#8221;Areas&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p><strong>During vishing tests, we assess your organization\u2019s exposure to:<\/strong><\/p>\n<ul>\n<li><strong>IT impersonation attacks<\/strong> \u2013 attackers pose as administrators and ask employees to change passwords, provide 2FA codes, or run malicious software.<\/p>\n<\/li>\n<li><strong>Fake financial requests<\/strong> \u2013 scammers impersonate CFOs, accounting staff, or vendors requesting urgent transfers or account details.\n<\/li>\n<li><strong>Call center and customer service attacks<\/strong> \u2013 we test whether frontline staff verify caller identity before sharing information.\n<\/li>\n<li><strong>Password reset fraud<\/strong> \u2013 we assess whether attackers can trick employees into resetting passwords and compromising accounts.\n<\/li>\n<li><strong>Psychological manipulation<\/strong> \u2013 we analyze how employees react to time pressure, threats, or emotional triggers used by fraudsters.\n<\/li>\n<\/ul>\n<p>Vishing tests help eliminate both human and procedural vulnerabilities\u2014before attackers can exploit them.<\/p>\n<p>[\/et_pb_tab][et_pb_tab title=&#8221;Tools&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p><strong>Tools and Techniques We Use<br \/><\/strong>\u00a0Our vishing simulations employ advanced social engineering methods and organizational vulnerability assessment tools:<\/p>\n<ul>\n<li><strong>Phone number spoofing<\/strong> \u2013 simulating calls from internal numbers, banks, or IT service providers.<\/p>\n<\/li>\n<li><strong>Voice AI &amp; deepfake testing<\/strong> \u2013 assessing whether employees can distinguish synthetic voices from real ones.\n<\/li>\n<li><strong>A\/B attack scenarios<\/strong> \u2013 varying test cases to evaluate manipulation effectiveness and staff resilience.\n<\/li>\n<li><strong>Call recording &amp; behavior analysis<\/strong> \u2013 capturing employee responses and providing actionable recommendations.\n<\/li>\n<li><strong>Post-test awareness workshops<\/strong> \u2013 training sessions to help staff identify vishing and learn defensive strategies.\n<\/li>\n<\/ul>\n<p>Our testing aligns with <strong>NIST<\/strong>, <strong>ISO 27001<\/strong>, and leading social engineering protection practices.<\/p>\n<p>[\/et_pb_tab][\/et_pb_tabs][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#EDF2FA&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_color=&#8221;#151C4B&#8221; header_3_text_align=&#8221;center&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2 style=\"text-align: center;\">Frequently Asked Questions<\/h2>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#B01E30&#8243; divider_weight=&#8221;5px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;10%&#8221; module_alignment=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#EDF2FA&#8221; width=&#8221;100%&#8221; width_tablet=&#8221;90%&#8221; width_phone=&#8221;90%&#8221; width_last_edited=&#8221;on|tablet&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; custom_padding=&#8221;0px|0px|0px|0px|false|false&#8221; custom_css_main_element=&#8221;display: flex;||flex-direction: column;||justify-content: space-between;||&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_accordion open_toggle_text_color=&#8221;#151C4B&#8221; closed_toggle_background_color=&#8221;#FFFFFF&#8221; toggle_icon=&#8221;&#x50;||divi||400&#8243; icon_color=&#8221;#151C4B&#8221; use_icon_font_size=&#8221;on&#8221; icon_font_size=&#8221;28px&#8221; module_id=&#8221;cf_accordion&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; toggle_text_color=&#8221;#151C4B&#8221; toggle_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; toggle_font_size=&#8221;1.5em&#8221; toggle_line_height=&#8221;1.2em&#8221; body_text_color=&#8221;#485060&#8243; body_font_size=&#8221;1.1em&#8221; hover_enabled=&#8221;0&#8243; border_radii=&#8221;on|10px|10px|10px|10px&#8221; border_width_all=&#8221;0px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;10px&#8221; box_shadow_color=&#8221;rgba(175,183,194,0.5)&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;][et_pb_accordion_item title=&#8221;Are vishing tests legal?&#8221; open=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>Yes. All tests are conducted with organizational consent and follow an agreed scenario. The goal is to educate employees\u2014not to penalize them.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;How often should vishing tests be conducted?&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; open=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>We recommend conducting tests at least quarterly, especially for finance, HR, and IT departments or staff with access to sensitive data.<\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_accordion open_toggle_text_color=&#8221;#151C4B&#8221; closed_toggle_background_color=&#8221;#FFFFFF&#8221; toggle_icon=&#8221;&#x50;||divi||400&#8243; icon_color=&#8221;#151C4B&#8221; use_icon_font_size=&#8221;on&#8221; icon_font_size=&#8221;28px&#8221; module_id=&#8221;cf_accordion&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; toggle_text_color=&#8221;#151C4B&#8221; toggle_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; toggle_font_size=&#8221;1.5em&#8221; toggle_line_height=&#8221;1.2em&#8221; body_text_color=&#8221;#485060&#8243; body_font_size=&#8221;1.1em&#8221; hover_enabled=&#8221;0&#8243; custom_css_free_form=&#8221;.et_pb_accordion .et_pb_toggle_open .et_pb_toggle_title:before {||    display: block!important;||    content: %22%924f%22 !important;||  \tcolor: #b01e30;||}||||.et_pb_toggle_open .et_pb_toggle_content::before {||  position: absolute;||  top: 10%;||  content: %22 %22;||  width: 30%;||  background: #B01E30;||  height: 3px;||  left: 0%;||  right: 0%;||  ||}&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; border_width_all=&#8221;0px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;10px&#8221; box_shadow_color=&#8221;rgba(175,183,194,0.5)&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;][et_pb_accordion_item title=&#8221;Do the tests involve call recording?&#8221; open=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>Yes. Calls are recorded for analysis and training purposes, with access restricted to the organization\u2019s designated security contact.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;What procedures help protect against vishing?&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; open=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>We recommend implementing <strong>call-back verification<\/strong>, where callers are validated via a separate communication channel, and regular staff training on vishing awareness.<\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#EDF2FA&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;20px||20px||false|false&#8221; da_disable_devices=&#8221;off|off|off&#8221; border_radii=&#8221;off||||&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_color=&#8221;#151C4B&#8221; header_3_text_align=&#8221;center&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2 style=\"text-align: center;\">Request a Quote<\/h2>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#B01E30&#8243; divider_weight=&#8221;5px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;10%&#8221; module_alignment=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; make_equal=&#8221;on&#8221; module_id=&#8221;contact&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; background_enable_color=&#8221;off&#8221; width=&#8221;100%&#8221; width_tablet=&#8221;90%&#8221; width_phone=&#8221;90%&#8221; width_last_edited=&#8221;on|tablet&#8221; custom_margin=&#8221;||75px||false|false&#8221; custom_padding=&#8221;0px||||false|false&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;10px&#8221; global_colors_info=&#8221;{}&#8221; global_module=&#8221;252241&#8243; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#151C4B&#8221; custom_padding=&#8221;0px|0px|0px|0px|false|false&#8221; custom_css_main_element=&#8221;display: flex;||flex-direction: column;||justify-content: space-between;||&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_4_text_color=&#8221;#FFFFFF&#8221; header_4_font_size=&#8221;24px&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_padding=&#8221;48px|||48px|false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<h4>Contact info<\/h4>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#B01E30&#8243; divider_weight=&#8221;5px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;20%&#8221; module_alignment=&#8221;left&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;|||48px|false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_divider][et_pb_code _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;24px||24px|48px|false|false&#8221; custom_css_free_form=&#8221;.contact-item {||    display: flex;||    align-items: center;||    margin-bottom: 15px;||  \tcolor: white;||  \tfont-size: 1.2em;||}||||\/*.contact-item .et-pb-icon {||    font-size: 28px;||    color: #B01E30;||    margin-right: 12px;||  \tfont-weight: bold;||}*\/||||.contact-item a {||    color: white;||    text-decoration: none;||}||||.contact-item a:hover {||    text-decoration: underline;||}||||.address {||    align-items: flex-start;||}||||.address-details {||    display: flex;||    flex-direction: column;||}||&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<div class=\"contact-container\"><!-- [et_pb_line_break_holder] -->\t<\/p>\n<div class=\"contact-item\"><!-- [et_pb_line_break_holder] -->    <span class=\"et-pb-icon\">\ue010<!-- [et_pb_line_break_holder] -->\t\t<\/span><!-- [et_pb_line_break_holder] -->\t<a href=\"mailto:info@cyberforces.com\">info@cyberforces.com<\/a><!-- [et_pb_line_break_holder] -->\t<\/div>\n<p><!-- [et_pb_line_break_holder] -->\t<\/p>\n<div class=\"contact-item\"><!-- [et_pb_line_break_holder] -->  \t<span class=\"et-pb-icon\">\ue00b<!-- [et_pb_line_break_holder] -->    <\/span><!-- [et_pb_line_break_holder] -->    <span>+48 505 372 810<!-- [et_pb_line_break_holder] -->\t\t<\/span><!-- [et_pb_line_break_holder] -->  <\/div>\n<p><!-- [et_pb_line_break_holder] -->  <\/p>\n<div class=\"contact-item address\"><!-- [et_pb_line_break_holder] -->\t\t<span class=\"et-pb-icon\">\ue0ef<!-- [et_pb_line_break_holder] -->\t\t<\/span><!-- [et_pb_line_break_holder] -->    <\/p>\n<div class=\"address-details\"><!-- [et_pb_line_break_holder] -->      <span>TestArmy Group S.A.<!-- [et_pb_line_break_holder] -->\t\t\t<\/span><!-- [et_pb_line_break_holder] -->      <span>ul.\u00a0Petuniowa 9\/5<!-- [et_pb_line_break_holder] -->\t\t\t<\/span><!-- [et_pb_line_break_holder] -->\t\t\t<span>53-238 Wroc\u0142aw<!-- [et_pb_line_break_holder] -->\t\t\t<\/span><!-- [et_pb_line_break_holder] -->\t\t\t<span>Polska<!-- [et_pb_line_break_holder] -->\t\t\t<\/span><!-- [et_pb_line_break_holder] -->    <\/div>\n<p><!-- [et_pb_line_break_holder] -->  <\/div>\n<p><!-- [et_pb_line_break_holder] --><\/div>\n<p>[\/et_pb_code][et_pb_image src=&#8221;https:\/\/cyberforces.com\/wp-content\/uploads\/cf_team.webp&#8221; title_text=&#8221;cf_team&#8221; show_bottom_space=&#8221;off&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_contact_form captcha=&#8221;off&#8221; email=&#8221;katarzyna.wojcik@testarmy.com, info@cyberforces.com&#8221; custom_message=&#8221;Nowa wiadomo\u015b\u0107:||et_pb_line_break_holder||||et_pb_line_break_holder||Imi\u0119 i nazwisko: %%Name%%||et_pb_line_break_holder||Telefon: %%Phone%%||et_pb_line_break_holder||Email: %%Email%%||et_pb_line_break_holder||Firma: %%Company%%||et_pb_line_break_holder||Wiadomo\u015b\u0107: %%Message%%&#8221; success_message=&#8221;Thank you! Your message has been sent.&#8221; submit_button_text=&#8221;Send&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; _unique_id=&#8221;c7bf614e-40dc-4f51-a574-09da4b946dfc&#8221; form_field_background_color=&#8221;RGBA(255,255,255,0)&#8221; form_field_text_color=&#8221;#151C4B&#8221; form_field_focus_background_color=&#8221;#EDF2FA&#8221; form_field_focus_text_color=&#8221;#151C4B&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;16px&#8221; button_text_color=&#8221;#EDF2FA&#8221; button_bg_color=&#8221;#B01E30&#8243; button_border_width=&#8221;3px&#8221; button_border_color=&#8221;#B01E30&#8243; button_border_radius=&#8221;10px&#8221; button_font=&#8221;Nunito Sans|700||on|||||&#8221; button_use_icon=&#8221;off&#8221; module_alignment=&#8221;center&#8221; custom_padding=&#8221;48px|48px|48px|48px|false|true&#8221; border_width_bottom=&#8221;1px&#8221; border_color_bottom=&#8221;#151C4B&#8221; global_colors_info=&#8221;{}&#8221; button_text_color__hover=&#8221;#B01E30&#8243; button_text_color__hover_enabled=&#8221;on|desktop&#8221; button_bg_color__hover=&#8221;#FFFFFF&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_border_color__hover=&#8221;#B01E30&#8243; button_border_color__hover_enabled=&#8221;on|hover&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_contact_field field_id=&#8221;Name&#8221; field_title=&#8221;Name&#8221; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; global_colors_info=&#8221;{}&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Email&#8221; field_title=&#8221;E-mail&#8221; field_type=&#8221;email&#8221; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; global_colors_info=&#8221;{}&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Message&#8221; field_title=&#8221;Message&#8221; field_type=&#8221;text&#8221; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; global_colors_info=&#8221;{}&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;GDPR&#8221; field_type=&#8221;checkbox&#8221; checkbox_options=&#8221;%91{%22value%22:%22I consent to the processing of my personal data by Testarmy Group S.A. for marketing purposes and I consent to receiving commercial information by e-mail or telephone. The consent may be withdrawn at any time.*%22,%22checked%22:0,%22dragID%22:-1}%93&#8243; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; form_field_text_color=&#8221;#485060&#8243; custom_css_free_form=&#8221;.et_pb_contact_field_options_title {||  display: none!important;||} &#8221; border_width_all=&#8221;1px&#8221; border_color_all=&#8221;#485060&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Privacy_Policy&#8221; field_type=&#8221;checkbox&#8221; checkbox_options=&#8221;%91{%22value%22:%22I have read the privacy policy and the clauses contained therein and accept its provisions.*%22,%22checked%22:0,%22dragID%22:-1}%93&#8243; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; form_field_text_color=&#8221;#485060&#8243; border_width_all=&#8221;1px&#8221; border_color_all=&#8221;#485060&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_contact_field][\/et_pb_contact_form][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Vishing Testing Resilience Against Voice Phishing AttacksCan your employees detect voice-based manipulation? Vishing (voice phishing) is a social engineering method where attackers impersonate IT staff, managers, banks, or institutions to extract information. Vishing tests help assess how vulnerable your organization is to such threats while raising employee awareness and improving their ability to recognize manipulation.What [&hellip;]<\/p>\n","protected":false},"author":28,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<p>[et_pb_section fb_built=\"1\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"#B01E30\" use_background_color_gradient=\"on\" background_color_gradient_direction=\"45deg\" background_color_gradient_stops=\"#b01e30 0%|#641d3e 100%\" da_disable_devices=\"off|off|off\" global_colors_info=\"{}\" da_is_popup=\"off\" da_exit_intent=\"off\" da_has_close=\"on\" da_alt_close=\"off\" da_dark_close=\"off\" da_not_modal=\"on\" da_is_singular=\"off\" da_with_loader=\"off\" da_has_shadow=\"on\"][et_pb_row column_structure=\"2_5,3_5\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"#FFFFFF\" width=\"100%\" width_tablet=\"90%\" width_phone=\"90%\" width_last_edited=\"on|tablet\" custom_padding=\"48px||48px|48px|true|false\" custom_css_main_element=\"display: flex;||align-items: center;\" border_radii=\"on|10px|10px|10px|10px\" box_shadow_style=\"preset1\" global_colors_info=\"{}\"][et_pb_column type=\"2_5\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/cyberforces.com\/wp-content\/uploads\/vishing_2.webp\" title_text=\"vishing_2\" align=\"center\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"100%\" hover_enabled=\"0\" global_colors_info=\"{}\" sticky_enabled=\"0\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_5\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"|48px|||false|false\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" header_text_color=\"#151C4B\" header_font_size=\"3em\" header_line_height=\"1.2em\" header_2_font=\"|700|||||||\" header_2_text_color=\"#151C4B\" header_2_line_height=\"1.2em\" header_3_text_align=\"center\" custom_margin=\"||10px||false|false\" custom_padding=\"||||false|false\" global_colors_info=\"{}\"]<\/p><h1 class=\"n-heading-primary u-mb-small\">Vishing<\/h1><h2 class=\"n-heading-primary u-mb-small\">Testy odporno\u015bci na\u00a0ataki telefoniczne (Voice Phishing)<\/h2><p>[\/et_pb_text][et_pb_divider color=\"#B01E30\" divider_weight=\"5px\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"25%\" module_alignment=\"left\" global_colors_info=\"{}\"][\/et_pb_divider][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" header_4_font=\"Raleway|500|||||||\" header_4_text_color=\"#485060\" header_4_font_size=\"1.2em\" header_4_line_height=\"1.4em\" global_colors_info=\"{}\"]<\/p><h4>Czy\u00a0Twoi pracownicy potrafi\u0105 rozpozna\u0107 manipulacj\u0119 przez\u00a0telefon? Vishing (voice phishing) to\u00a0metoda ataku socjotechnicznego, w\u00a0kt\u00f3rej\u00a0oszu\u015bci podszywaj\u0105 si\u0119 pod\u00a0pracownik\u00f3w IT, prze\u0142o\u017conych, banki lub instytucje, aby wy\u0142udzi\u0107 informacje. Testy vishingowe pomagaj\u0105 oceni\u0107 podatno\u015b\u0107 organizacji na\u00a0tego typu zagro\u017cenia oraz\u00a0zwi\u0119kszaj\u0105 \u015bwiadomo\u015b\u0107 pracownik\u00f3w, ucz\u0105c ich rozpoznawania pr\u00f3b manipulacji.<\/h4><p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\"1\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"#EDF2FA\" custom_padding=\"||||false|false\" da_disable_devices=\"off|off|off\" global_colors_info=\"{}\" da_is_popup=\"off\" da_exit_intent=\"off\" da_has_close=\"on\" da_alt_close=\"off\" da_dark_close=\"off\" da_not_modal=\"on\" da_is_singular=\"off\" da_with_loader=\"off\" da_has_shadow=\"on\"][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" header_2_font=\"|700|||||||\" header_2_text_color=\"#151C4B\" header_2_line_height=\"1.2em\" header_3_text_align=\"center\" custom_margin=\"||10px||false|false\" custom_padding=\"||||false|false\" global_colors_info=\"{}\"]<\/p><h2 style=\"text-align: center;\">Jakie korzy\u015bci p\u0142yn\u0105 z\u00a0test\u00f3w vishingowych?<\/h2><p>[\/et_pb_text][et_pb_divider color=\"#B01E30\" divider_weight=\"5px\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"10%\" module_alignment=\"center\" custom_margin=\"||||false|false\" global_colors_info=\"{}\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" use_custom_gutter=\"on\" gutter_width=\"2\" make_equal=\"on\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"||||false|false\" custom_padding=\"0px||||false|false\" locked=\"off\" global_colors_info=\"{}\" custom_css_main_element_last_edited=\"on|phone\"][et_pb_column type=\"1_2\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"#FFFFFF\" custom_padding=\"12px|24px|12px|24px|true|false\" animation_style=\"fade\" animation_direction=\"left\" custom_css_main_element=\"||||||\" border_radii=\"on|10px|10px|10px|10px\" box_shadow_style=\"preset1\" box_shadow_blur=\"10px\" global_colors_info=\"{}\" transform_styles__hover_enabled=\"on|hover\" transform_scale__hover_enabled=\"on|hover\" transform_translate__hover_enabled=\"on|desktop\" transform_rotate__hover_enabled=\"on|desktop\" transform_skew__hover_enabled=\"on|desktop\" transform_origin__hover_enabled=\"on|desktop\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" header_2_font=\"|--et_global_heading_font_weight|||||||\" header_2_text_color=\"#151C4B\" header_3_font=\"|--et_global_heading_font_weight|||||||\" header_3_text_color=\"#151C4B\" custom_margin=\"||0px||false|false\" custom_padding=\"||||false|false\" hover_enabled=\"0\" custom_css_before=\"||\" global_colors_info=\"{}\" sticky_enabled=\"0\"]<\/p><div style=\"display: flex; justify-content: space-between; align-items: center; column-gap: 2em;\"><div><h3 class=\"n-heading-secondary u-mb-small\">Identyfikacja s\u0142abych punkt\u00f3w w\u00a0komunikacji firmowej<\/h3><\/div><div><img style=\"max-width: 80px; vertical-align: middle;\" src=\"https:\/\/cyberforces.com\/wp-content\/uploads\/critical_threat.webp;\" \/><\/div><\/div><p>[\/et_pb_text][et_pb_divider color=\"#B01E30\" divider_weight=\"5px\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"25%\" module_alignment=\"left\" custom_margin=\"||0px||false|false\" custom_padding=\"||0px||false|false\" global_colors_info=\"{}\"][\/et_pb_divider][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" text_text_color=\"#485060\" text_font_size=\"1em\" custom_margin=\"||10px||false|false\" global_colors_info=\"{}\"]<\/p><p>- oceniamy, czy\u00a0pracownicy przekazuj\u0105 poufne informacje przez\u00a0telefon osobom nieuprawnionym.<\/p><p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"#FFFFFF\" custom_padding=\"12px|24px|12px|24px|true|false\" animation_style=\"fade\" animation_direction=\"right\" border_radii=\"on|10px|10px|10px|10px\" box_shadow_style=\"preset1\" box_shadow_blur=\"10px\" global_colors_info=\"{}\" transform_styles__hover_enabled=\"on|hover\" transform_scale__hover_enabled=\"on|hover\" transform_translate__hover_enabled=\"on|desktop\" transform_rotate__hover_enabled=\"on|desktop\" transform_skew__hover_enabled=\"on|desktop\" transform_origin__hover_enabled=\"on|desktop\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" header_2_font=\"|--et_global_heading_font_weight|||||||\" header_2_text_color=\"#151C4B\" header_3_font=\"|--et_global_heading_font_weight|||||||\" header_3_text_color=\"#151C4B\" custom_margin=\"||0px||false|false\" hover_enabled=\"0\" global_colors_info=\"{}\" sticky_enabled=\"0\"]<\/p><div style=\"display: flex; justify-content: space-between; align-items: center;\"><div><h3 class=\"n-heading-secondary u-mb-small\">Ochrona przed\u00a0atakami na\u00a0dane osobowe i\u00a0finansowe<\/h3><\/div><div><img style=\"max-width: 80px; vertical-align: middle;\" src=\"https:\/\/cyberforces.com\/wp-content\/uploads\/data_protection.webp;\" \/><\/div><\/div><p>[\/et_pb_text][et_pb_divider color=\"#B01E30\" divider_weight=\"5px\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"25%\" module_alignment=\"left\" custom_margin=\"||0px||false|false\" custom_padding=\"||0px||false|false\" global_colors_info=\"{}\"][\/et_pb_divider][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" text_text_color=\"#485060\" text_font_size=\"1em\" custom_margin=\"||10px||false|false\" global_colors_info=\"{}\"]- vishing jest wykorzystywany do\u00a0kradzie\u017cy to\u017csamo\u015bci, przej\u0119cia kont i\u00a0wy\u0142udzania \u015brodk\u00f3w finansowych.[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" use_custom_gutter=\"on\" gutter_width=\"2\" make_equal=\"on\" _builder_version=\"4.27.4\" _module_preset=\"default\" locked=\"off\" global_colors_info=\"{}\" custom_css_main_element_last_edited=\"on|phone\"][et_pb_column type=\"1_2\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"#FFFFFF\" custom_padding=\"12px|24px|12px|24px|true|false\" animation_style=\"fade\" animation_direction=\"bottom\" custom_css_main_element=\"||||||\" border_radii=\"on|10px|10px|10px|10px\" box_shadow_style=\"preset1\" box_shadow_blur=\"10px\" global_colors_info=\"{}\" transform_styles__hover_enabled=\"on|hover\" transform_scale__hover_enabled=\"on|hover\" transform_translate__hover_enabled=\"on|desktop\" transform_rotate__hover_enabled=\"on|desktop\" transform_skew__hover_enabled=\"on|desktop\" transform_origin__hover_enabled=\"on|desktop\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" header_2_font=\"|--et_global_heading_font_weight|||||||\" header_2_text_color=\"#151C4B\" header_3_font=\"|--et_global_heading_font_weight|||||||\" header_3_text_color=\"#151C4B\" custom_margin=\"||0px||false|false\" hover_enabled=\"0\" global_colors_info=\"{}\" sticky_enabled=\"0\"]<\/p><div style=\"display: flex; justify-content: space-between; align-items: center;\"><div><h3 class=\"n-heading-secondary u-mb-small\">Podniesienie \u015bwiadomo\u015bci zagro\u017ce\u0144<\/h3><\/div><div><img style=\"max-width: 80px; vertical-align: middle;\" src=\"https:\/\/cyberforces.com\/wp-content\/uploads\/cyberawareness_2.webp;\" \/><\/div><\/div><p>[\/et_pb_text][et_pb_divider color=\"#B01E30\" divider_weight=\"5px\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"25%\" module_alignment=\"left\" custom_margin=\"||0px||false|false\" custom_padding=\"||0px||false|false\" global_colors_info=\"{}\"][\/et_pb_divider][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" text_text_color=\"#485060\" text_font_size=\"1em\" custom_margin=\"||10px||false|false\" global_colors_info=\"{}\"]<\/p><p>- testy ucz\u0105 pracownik\u00f3w, jak rozpoznawa\u0107 oszust\u00f3w i\u00a0jakie procedury stosowa\u0107 w\u00a0przypadku podejrzanych rozm\u00f3w.<\/p><p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"#FFFFFF\" custom_padding=\"12px|24px|12px|24px|true|false\" animation_style=\"fade\" animation_direction=\"bottom\" border_radii=\"on|10px|10px|10px|10px\" box_shadow_style=\"preset1\" box_shadow_blur=\"10px\" global_colors_info=\"{}\" transform_styles__hover_enabled=\"on|hover\" transform_scale__hover_enabled=\"on|hover\" transform_translate__hover_enabled=\"on|desktop\" transform_rotate__hover_enabled=\"on|desktop\" transform_skew__hover_enabled=\"on|desktop\" transform_origin__hover_enabled=\"on|desktop\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" header_2_font=\"|--et_global_heading_font_weight|||||||\" header_2_text_color=\"#151C4B\" header_3_font=\"|--et_global_heading_font_weight|||||||\" header_3_text_color=\"#151C4B\" custom_margin=\"||0px||false|false\" hover_enabled=\"0\" global_colors_info=\"{}\" sticky_enabled=\"0\"]<\/p><div style=\"display: flex; justify-content: space-between; align-items: center; column-gap: 1em;\"><div><h3 class=\"n-heading-secondary u-mb-small\">Wzmocnienie polityki bezpiecze\u0144stwa<\/h3><\/div><div><img style=\"max-width: 80px; vertical-align: middle;\" src=\"https:\/\/cyberforces.com\/wp-content\/uploads\/report.webp;\" \/><\/div><\/div><p>[\/et_pb_text][et_pb_divider color=\"#B01E30\" divider_weight=\"5px\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"25%\" module_alignment=\"left\" custom_margin=\"||0px||false|false\" custom_padding=\"||0px||false|false\" global_colors_info=\"{}\"][\/et_pb_divider][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" text_text_color=\"#485060\" text_font_size=\"1em\" custom_margin=\"||10px||false|false\" global_colors_info=\"{}\"]<\/p><p>- dostarczamy rekomendacje dotycz\u0105ce procedur weryfikacji to\u017csamo\u015bci rozm\u00f3wc\u00f3w i\u00a0post\u0119powania w\u00a0przypadku pr\u00f3b oszustwa.<\/p><p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\"1\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"#151C4B\" use_background_color_gradient=\"on\" background_color_gradient_direction=\"45deg\" background_color_gradient_stops=\"#b01e30 0%|#151c4b 100%\" custom_margin=\"||||false|false\" custom_padding=\"||||false|false\" da_disable_devices=\"off|off|off\" border_radii=\"off||||\" global_colors_info=\"{}\" da_is_popup=\"off\" da_exit_intent=\"off\" da_has_close=\"on\" da_alt_close=\"off\" da_dark_close=\"off\" da_not_modal=\"on\" da_is_singular=\"off\" da_with_loader=\"off\" da_has_shadow=\"on\"][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"#FFFFFF\" width=\"100%\" width_tablet=\"90%\" width_phone=\"90%\" width_last_edited=\"on|tablet\" custom_padding=\"|48px||48px|false|true\" border_radii=\"on|10px|10px|10px|10px\" box_shadow_style=\"preset1\" box_shadow_blur=\"10px\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" header_2_font=\"|700|||||||\" header_2_text_color=\"#151C4B\" header_3_text_align=\"center\" custom_margin=\"||10px||false|false\" custom_padding=\"||||false|false\" global_colors_info=\"{}\"]<\/p><h2 style=\"text-align: center;\">Czym jest vishing i\u00a0jak dzia\u0142a?<\/h2><p>[\/et_pb_text][et_pb_divider color=\"#B01E30\" divider_weight=\"5px\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"10%\" module_alignment=\"center\" custom_margin=\"||0px||false|false\" global_colors_info=\"{}\"][\/et_pb_divider][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" text_font=\"Nunito Sans|--et_global_body_font_weight|||||||\" text_text_color=\"#485060\" text_font_size=\"1.2em\" header_2_font=\"|--et_global_heading_font_weight|||||||\" header_2_text_color=\"#151C4B\" header_3_font=\"|--et_global_heading_font_weight|||||||\" header_3_text_color=\"#151C4B\" header_4_text_color=\"#151C4B\" header_4_font_size=\"1em\" header_4_line_height=\"1.2em\" custom_margin=\"||15px||false|false\" global_colors_info=\"{}\"]<\/p><p style=\"text-align: center;\">Vishing (voice phishing) to\u00a0metoda oszustwa polegaj\u0105ca na\u00a0manipulacji ofiary podczas rozmowy telefonicznej w\u00a0celu uzyskania poufnych informacji lub sk\u0142onienia jej do\u00a0wykonania okre\u015blonej czynno\u015bci.<\/p><p>[\/et_pb_text][et_pb_tabs active_tab_background_color=\"#EDF2FA\" inactive_tab_background_color=\"#AFB7C2\" active_tab_text_color=\"#151C4B\" _builder_version=\"4.27.4\" _module_preset=\"default\" tab_text_color=\"#485060\" body_font=\"Nunito Sans||||||||\" body_text_color=\"#485060\" body_font_size=\"1.2em\" tab_font=\"--et_global_heading_font|700|||||||\" tab_font_size=\"1.1em\" background_color=\"#EDF2FA\" custom_css_free_form=\"ul.et_pb_tabs_controls::after {|| border-top: none !important;\" custom_css_tabs_controls=\"background-color: #ffffff !important;\" border_radii=\"on|10px|10px|10px|10px\" border_width_all=\"0px\" global_colors_info=\"{}\" custom_css_tabs_controls__hover_enabled=\"off|desktop\"][et_pb_tab title=\"Obszary\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p><p><strong>Podczas test\u00f3w vishingowych analizujemy podatno\u015b\u0107 organizacji na:<\/strong><\/p><ul><li><strong>Podszywanie si\u0119 pod\u00a0dzia\u0142 IT<\/strong> \u2013 atakuj\u0105cy udaje administratora i\u00a0prosi o\u00a0zmian\u0119 has\u0142a, podanie kod\u00f3w 2FA lub uruchomienie z\u0142o\u015bliwego oprogramowania.<\/li><li><strong>Fa\u0142szywe pro\u015bby o\u00a0przelewy i\u00a0dane finansowe<\/strong> \u2013 oszu\u015bci mog\u0105 podszywa\u0107 si\u0119 pod\u00a0CFO, ksi\u0119gowo\u015b\u0107 lub dostawc\u00f3w us\u0142ug.<\/li><li><strong>Ataki na\u00a0call center i\u00a0obs\u0142ug\u0119 klienta<\/strong> \u2013 testujemy, czy\u00a0pracownicy weryfikuj\u0105 to\u017csamo\u015b\u0107 rozm\u00f3wc\u00f3w przed\u00a0udzieleniem informacji.<\/li><li><strong>Oszustwa zwi\u0105zane z\u00a0resetowaniem hase\u0142<\/strong> \u2013 badamy, czy\u00a0atakuj\u0105cy mog\u0105 wymusi\u0107 zmian\u0119 has\u0142a i\u00a0przej\u0105\u0107 konta u\u017cytkownik\u00f3w.<\/li><li><strong>Manipulacj\u0119 psychologiczn\u0105<\/strong> \u2013 oceniamy, czy\u00a0pracownicy s\u0105\u00a0podatni na\u00a0presj\u0119 czasu, gro\u017aby lub emocjonalne chwyty stosowane przez\u00a0oszust\u00f3w.<\/li><\/ul><p><strong>Testy vishingowe pomagaj\u0105 organizacjom eliminowa\u0107 luki w\u00a0zabezpieczeniach ludzkich i\u00a0technicznych, zanim wykorzystaj\u0105 je\u00a0cyberprzest\u0119pcy.<\/strong><\/p><p>[\/et_pb_tab][et_pb_tab title=\"Narz\u0119dzia\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p><p><strong>Narz\u0119dzia i\u00a0techniki, kt\u00f3re wykorzystujemy<\/strong><\/p><p>Podczas test\u00f3w vishingowych stosujemy zaawansowane techniki socjotechniczne i\u00a0narz\u0119dzia do\u00a0analizy podatno\u015bci organizacji:<\/p><ul><li><strong>Spoofing numer\u00f3w telefonicznych<\/strong> \u2013 symulujemy po\u0142\u0105czenia z\u00a0numer\u00f3w wewn\u0119trznych, instytucji finansowych i\u00a0dostawc\u00f3w IT.<\/li><li><strong>Voice AI & Deepfake<\/strong> \u2013 testujemy, czy\u00a0pracownicy potrafi\u0105 odr\u00f3\u017cni\u0107 syntetyczny g\u0142os od\u00a0prawdziwej osoby.<\/li><li><strong>Scenariusze A\/B<\/strong> \u2013 r\u00f3\u017cne warianty atak\u00f3w pozwalaj\u0105 oceni\u0107 skuteczno\u015b\u0107 manipulacji i\u00a0odporno\u015b\u0107 pracownik\u00f3w.<\/li><li><strong>Nagrywanie i\u00a0analiza zachowa\u0144<\/strong> \u2013 badamy reakcje pracownik\u00f3w i\u00a0dostarczamy raport z\u00a0rekomendacjami.<\/li><li><strong>Szkolenia post-testowe<\/strong> \u2013 organizujemy warsztaty u\u015bwiadamiaj\u0105ce, jak rozpoznawa\u0107 vishing i\u00a0jak si\u0119 przed\u00a0nim chroni\u0107.<\/li><\/ul><p><strong>Nasze testy s\u0105\u00a0zgodne z\u00a0normami NIST, ISO 27001 oraz\u00a0najlepszymi praktykami w\u00a0zakresie ochrony przed\u00a0atakami socjotechnicznymi.<\/strong><\/p><p>[\/et_pb_tab][\/et_pb_tabs][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\"1\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"#EDF2FA\" da_disable_devices=\"off|off|off\" global_colors_info=\"{}\" da_is_popup=\"off\" da_exit_intent=\"off\" da_has_close=\"on\" da_alt_close=\"off\" da_dark_close=\"off\" da_not_modal=\"on\" da_is_singular=\"off\" da_with_loader=\"off\" da_has_shadow=\"on\"][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" header_2_font=\"|700|||||||\" header_2_text_color=\"#151C4B\" header_3_text_align=\"center\" custom_margin=\"||10px||false|false\" custom_padding=\"||||false|false\" global_colors_info=\"{}\"]<\/p><h2 style=\"text-align: center;\">Cz\u0119sto zadawane pytania<\/h2><p>[\/et_pb_text][et_pb_divider color=\"#B01E30\" divider_weight=\"5px\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"10%\" module_alignment=\"center\" global_colors_info=\"{}\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" use_custom_gutter=\"on\" gutter_width=\"2\" make_equal=\"on\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"#EDF2FA\" width=\"100%\" width_tablet=\"90%\" width_phone=\"90%\" width_last_edited=\"on|tablet\" custom_margin=\"||||false|false\" custom_padding=\"0px||0px||false|false\" border_radii=\"on|10px|10px|10px|10px\" global_colors_info=\"{}\"][et_pb_column type=\"1_2\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_enable_color=\"off\" custom_padding=\"0px|0px|0px|0px|false|false\" custom_css_main_element=\"display: flex;||flex-direction: column;||justify-content: space-between;||\" global_colors_info=\"{}\"][et_pb_accordion open_toggle_text_color=\"#151C4B\" closed_toggle_background_color=\"#FFFFFF\" toggle_icon=\"P||divi||400\" icon_color=\"#151C4B\" use_icon_font_size=\"on\" icon_font_size=\"28px\" module_id=\"cf_accordion\" _builder_version=\"4.27.4\" _module_preset=\"default\" toggle_text_color=\"#151C4B\" toggle_font=\"|--et_global_heading_font_weight|||||||\" toggle_font_size=\"1.5em\" toggle_line_height=\"1.2em\" body_text_color=\"#485060\" body_font_size=\"1.1em\" border_radii=\"on|10px|10px|10px|10px\" border_width_all=\"0px\" box_shadow_style=\"preset1\" box_shadow_blur=\"10px\" box_shadow_color=\"rgba(175,183,194,0.5)\" global_colors_info=\"{}\"][et_pb_accordion_item title=\"Czy testy vishingowe s\u0105\u00a0legalne?\" open=\"on\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p><p>Tak, testy s\u0105\u00a0przeprowadzane za\u00a0zgod\u0105 organizacji i\u00a0zgodnie z\u00a0ustalonym scenariuszem. Ich celem jest edukacja pracownik\u00f3w, a\u00a0nie\u00a0ich obwinianie.<\/p><p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"Jak cz\u0119sto nale\u017cy przeprowadza\u0107 testy vishingowe?\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p><p>Rekomendujemy testy co\u00a0najmniej raz na\u00a0kwarta\u0142, zw\u0142aszcza dla dzia\u0142\u00f3w finansowych, HR, IT oraz\u00a0os\u00f3b maj\u0105cych dost\u0119p do\u00a0wra\u017cliwych danych.<\/p><p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_enable_color=\"off\" global_colors_info=\"{}\"][et_pb_accordion open_toggle_text_color=\"#151C4B\" closed_toggle_background_color=\"#FFFFFF\" toggle_icon=\"P||divi||400\" icon_color=\"#151C4B\" use_icon_font_size=\"on\" icon_font_size=\"28px\" module_id=\"cf_accordion\" _builder_version=\"4.27.4\" _module_preset=\"default\" toggle_text_color=\"#151C4B\" toggle_font=\"|--et_global_heading_font_weight|||||||\" toggle_font_size=\"1.5em\" toggle_line_height=\"1.2em\" body_text_color=\"#485060\" body_font_size=\"1.1em\" custom_css_free_form=\".et_pb_accordion .et_pb_toggle_open .et_pb_toggle_title:before {|| display: block!important;|| content: %22%924f%22 !important;|| color: #b01e30;||}||||.et_pb_toggle_open .et_pb_toggle_content::before {|| position: absolute;|| top: 10%;|| content: %22 %22;|| width: 30%;|| background: #B01E30;|| height: 3px;|| left: 0%;|| right: 0%;|| ||}\" border_radii=\"on|10px|10px|10px|10px\" border_width_all=\"0px\" box_shadow_style=\"preset1\" box_shadow_blur=\"10px\" box_shadow_color=\"rgba(175,183,194,0.5)\" global_colors_info=\"{}\"][et_pb_accordion_item title=\"Czy testy obejmuj\u0105 nagrywanie rozm\u00f3w?\" open=\"on\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p><p>Tak, rozmowy s\u0105\u00a0nagrywane w\u00a0celach analizy i\u00a0szkoleniowych, ale\u00a0dost\u0119p do\u00a0nagra\u0144 ma\u00a0wy\u0142\u0105cznie osoba odpowiedzialna za\u00a0bezpiecze\u0144stwo organizacji.<\/p><p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"Jakie procedury nale\u017cy wdro\u017cy\u0107, by\u00a0zabezpieczy\u0107 si\u0119 przed\u00a0vishingiem?\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p><p>Zalecamy wprowadzenie zasady <strong>call-back verification<\/strong>, czyli weryfikacji rozm\u00f3wc\u00f3w przez\u00a0niezale\u017cny kana\u0142 komunikacyjny, oraz\u00a0szkolenia pracownik\u00f3w w\u00a0zakresie rozpoznawania pr\u00f3b oszustwa.<\/p><p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\"1\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"#EDF2FA\" custom_margin=\"||||false|false\" custom_padding=\"20px||20px||false|false\" da_disable_devices=\"off|off|off\" border_radii=\"off||||\" global_colors_info=\"{}\" da_is_popup=\"off\" da_exit_intent=\"off\" da_has_close=\"on\" da_alt_close=\"off\" da_dark_close=\"off\" da_not_modal=\"on\" da_is_singular=\"off\" da_with_loader=\"off\" da_has_shadow=\"on\"][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" header_2_font=\"|700|||||||\" header_2_text_color=\"#151C4B\" header_3_text_align=\"center\" custom_margin=\"||10px||false|false\" custom_padding=\"||||false|false\" global_colors_info=\"{}\"]<\/p><h2 style=\"text-align: center;\">Wyce\u0144 projekt<\/h2><p>[\/et_pb_text][et_pb_divider color=\"#B01E30\" divider_weight=\"5px\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"10%\" module_alignment=\"center\" global_colors_info=\"{}\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" use_custom_gutter=\"on\" gutter_width=\"1\" make_equal=\"on\" module_id=\"contact\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"#FFFFFF\" background_enable_color=\"off\" width=\"100%\" width_tablet=\"90%\" width_phone=\"90%\" width_last_edited=\"on|tablet\" custom_margin=\"||75px||false|false\" custom_padding=\"0px||||false|false\" border_radii=\"on|10px|10px|10px|10px\" box_shadow_style=\"preset1\" box_shadow_blur=\"10px\" global_colors_info=\"{}\" global_module=\"226612\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_2\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"#151C4B\" custom_padding=\"0px|0px|0px|0px|false|false\" custom_css_main_element=\"display: flex;||flex-direction: column;||justify-content: space-between;||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" header_4_text_color=\"#FFFFFF\" header_4_font_size=\"24px\" custom_margin=\"||10px||false|false\" custom_padding=\"48px|||48px|false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p><h4>Dane kontaktowe<\/h4><p>[\/et_pb_text][et_pb_divider color=\"#B01E30\" divider_weight=\"5px\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"20%\" module_alignment=\"left\" custom_margin=\"||0px||false|false\" custom_padding=\"|||48px|false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_divider][et_pb_code _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"24px||24px|48px|false|false\" custom_css_free_form=\".contact-item {|| display: flex;|| align-items: center;|| margin-bottom: 15px;|| color: white;|| font-size: 1.2em;||}||||\/*.contact-item .et-pb-icon {|| font-size: 28px;|| color: #B01E30;|| margin-right: 12px;|| font-weight: bold;||}*\/||||.contact-item a {|| color: white;|| text-decoration: none;||}||||.contact-item a:hover {|| text-decoration: underline;||}||||.address {|| align-items: flex-start;||}||||.address-details {|| display: flex;|| flex-direction: column;||}||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p><div class=\"contact-container\"><!-- [et_pb_line_break_holder] --><div class=\"contact-item\"><!-- [et_pb_line_break_holder] --> <span class=\"et-pb-icon\">\ue010<!-- [et_pb_line_break_holder] --> <\/span><!-- [et_pb_line_break_holder] --> <a href=\"mailto:info@cyberforces.com\">info@cyberforces.com<\/a><!-- [et_pb_line_break_holder] --><\/div><p><!-- [et_pb_line_break_holder] --><\/p><div class=\"contact-item\"><!-- [et_pb_line_break_holder] --> <span class=\"et-pb-icon\">\ue00b<!-- [et_pb_line_break_holder] --> <\/span><!-- [et_pb_line_break_holder] --> +48 505 372 810<!-- [et_pb_line_break_holder] --> <!-- [et_pb_line_break_holder] --><\/div><p><!-- [et_pb_line_break_holder] --><\/p><div class=\"contact-item address\"><!-- [et_pb_line_break_holder] --> <span class=\"et-pb-icon\">\ue0ef<!-- [et_pb_line_break_holder] --> <\/span><!-- [et_pb_line_break_holder] --><div class=\"address-details\"><!-- [et_pb_line_break_holder] --> TestArmy Group S.A.<!-- [et_pb_line_break_holder] --> <!-- [et_pb_line_break_holder] --> ul.\u00a0Petuniowa 9\/5<!-- [et_pb_line_break_holder] --> <!-- [et_pb_line_break_holder] --> 53-238 Wroc\u0142aw<!-- [et_pb_line_break_holder] --> <!-- [et_pb_line_break_holder] --> Polska<!-- [et_pb_line_break_holder] --> <!-- [et_pb_line_break_holder] --><\/div><p><!-- [et_pb_line_break_holder] --><\/p><\/div><p><!-- [et_pb_line_break_holder] --><\/p><\/div><p>[\/et_pb_code][et_pb_image src=\"https:\/\/cyberforces.com\/wp-content\/uploads\/cf_team.webp\" title_text=\"cf_team\" show_bottom_space=\"off\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"||||false|false\" custom_padding=\"||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"#FFFFFF\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_contact_form captcha=\"off\" email=\"katarzyna.wojcik@testarmy.com, info@cyberforces.com\" custom_message=\"Nowa wiadomo\u015b\u0107:||et_pb_line_break_holder||||et_pb_line_break_holder||Imi\u0119 i nazwisko: %%Name%%||et_pb_line_break_holder||Telefon: %%Phone%%||et_pb_line_break_holder||Email: %%Email%%||et_pb_line_break_holder||Firma: %%Company%%||et_pb_line_break_holder||Wiadomo\u015b\u0107: %%Message%%\" success_message=\"Dzi\u0119kujemy! Twoja wiadomo\u015b\u0107 zosta\u0142a wys\u0142ana.\" submit_button_text=\"Wy\u015blij\" _builder_version=\"4.27.4\" _module_preset=\"default\" _unique_id=\"c7bf614e-40dc-4f51-a574-09da4b946dfc\" form_field_background_color=\"RGBA(255,255,255,0)\" form_field_text_color=\"#151C4B\" form_field_focus_background_color=\"#EDF2FA\" form_field_focus_text_color=\"#151C4B\" custom_button=\"on\" button_text_size=\"16px\" button_text_color=\"#EDF2FA\" button_bg_color=\"#B01E30\" button_border_width=\"3px\" button_border_color=\"#B01E30\" button_border_radius=\"10px\" button_font=\"Nunito Sans|700||on|||||\" button_use_icon=\"off\" module_alignment=\"center\" custom_padding=\"48px|48px|48px|48px|false|true\" border_width_bottom=\"1px\" border_color_bottom=\"#151C4B\" global_colors_info=\"{}\" button_text_color__hover=\"#B01E30\" button_text_color__hover_enabled=\"on|desktop\" button_bg_color__hover=\"#FFFFFF\" button_bg_color__hover_enabled=\"on|hover\" button_border_color__hover=\"#B01E30\" button_border_color__hover_enabled=\"on|hover\" theme_builder_area=\"post_content\"][et_pb_contact_field field_id=\"Name\" field_title=\"Imi\u0119\" fullwidth_field=\"on\" _builder_version=\"4.27.4\" global_colors_info=\"{}\" button_text_size__hover_enabled=\"off\" button_one_text_size__hover_enabled=\"off\" button_two_text_size__hover_enabled=\"off\" button_text_color__hover_enabled=\"off\" button_one_text_color__hover_enabled=\"off\" button_two_text_color__hover_enabled=\"off\" button_border_width__hover_enabled=\"off\" button_one_border_width__hover_enabled=\"off\" button_two_border_width__hover_enabled=\"off\" button_border_color__hover_enabled=\"off\" button_one_border_color__hover_enabled=\"off\" button_two_border_color__hover_enabled=\"off\" button_border_radius__hover_enabled=\"off\" button_one_border_radius__hover_enabled=\"off\" button_two_border_radius__hover_enabled=\"off\" button_letter_spacing__hover_enabled=\"off\" button_one_letter_spacing__hover_enabled=\"off\" button_two_letter_spacing__hover_enabled=\"off\" button_bg_color__hover_enabled=\"off\" button_one_bg_color__hover_enabled=\"off\" button_two_bg_color__hover_enabled=\"off\" theme_builder_area=\"post_content\"][\/et_pb_contact_field][et_pb_contact_field field_id=\"Company\" field_title=\"Firma\" fullwidth_field=\"on\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_contact_field][et_pb_contact_field field_id=\"Email\" field_title=\"Adres e-mail\" field_type=\"email\" fullwidth_field=\"on\" _builder_version=\"4.27.4\" global_colors_info=\"{}\" button_text_size__hover_enabled=\"off\" button_one_text_size__hover_enabled=\"off\" button_two_text_size__hover_enabled=\"off\" button_text_color__hover_enabled=\"off\" button_one_text_color__hover_enabled=\"off\" button_two_text_color__hover_enabled=\"off\" button_border_width__hover_enabled=\"off\" button_one_border_width__hover_enabled=\"off\" button_two_border_width__hover_enabled=\"off\" button_border_color__hover_enabled=\"off\" button_one_border_color__hover_enabled=\"off\" button_two_border_color__hover_enabled=\"off\" button_border_radius__hover_enabled=\"off\" button_one_border_radius__hover_enabled=\"off\" button_two_border_radius__hover_enabled=\"off\" button_letter_spacing__hover_enabled=\"off\" button_one_letter_spacing__hover_enabled=\"off\" button_two_letter_spacing__hover_enabled=\"off\" button_bg_color__hover_enabled=\"off\" button_one_bg_color__hover_enabled=\"off\" button_two_bg_color__hover_enabled=\"off\" theme_builder_area=\"post_content\"][\/et_pb_contact_field][et_pb_contact_field field_id=\"Phone\" field_title=\"Telefon\" fullwidth_field=\"on\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_contact_field][et_pb_contact_field field_id=\"Message\" field_title=\"Wiadomo\u015b\u0107\" field_type=\"text\" fullwidth_field=\"on\" _builder_version=\"4.27.4\" global_colors_info=\"{}\" button_text_size__hover_enabled=\"off\" button_one_text_size__hover_enabled=\"off\" button_two_text_size__hover_enabled=\"off\" button_text_color__hover_enabled=\"off\" button_one_text_color__hover_enabled=\"off\" button_two_text_color__hover_enabled=\"off\" button_border_width__hover_enabled=\"off\" button_one_border_width__hover_enabled=\"off\" button_two_border_width__hover_enabled=\"off\" button_border_color__hover_enabled=\"off\" button_one_border_color__hover_enabled=\"off\" button_two_border_color__hover_enabled=\"off\" button_border_radius__hover_enabled=\"off\" button_one_border_radius__hover_enabled=\"off\" button_two_border_radius__hover_enabled=\"off\" button_letter_spacing__hover_enabled=\"off\" button_one_letter_spacing__hover_enabled=\"off\" button_two_letter_spacing__hover_enabled=\"off\" button_bg_color__hover_enabled=\"off\" button_one_bg_color__hover_enabled=\"off\" button_two_bg_color__hover_enabled=\"off\" theme_builder_area=\"post_content\"][\/et_pb_contact_field][et_pb_contact_field field_id=\"GDPR\" field_type=\"checkbox\" checkbox_options=\"%91{%22value%22:%22Wyra\u017cam zgod\u0119 na przetwarzanie danych osobowych przez Testarmy Group S.A. w celach marketingowych oraz wyra\u017cam zgod\u0119 na przesy\u0142anie mi drog\u0105 elektroniczn\u0105 lub telefoniczn\u0105 informacji handlowych. Zgoda mo\u017ce zosta\u0107 w ka\u017cdym czasie cofni\u0119ta. *%22,%22checked%22:0,%22dragID%22:-1}%93\" fullwidth_field=\"on\" _builder_version=\"4.27.4\" _module_preset=\"default\" form_field_text_color=\"#485060\" custom_css_free_form=\".et_pb_contact_field_options_title {|| display: none!important;||} \" border_width_all=\"1px\" border_color_all=\"#485060\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_contact_field][et_pb_contact_field field_id=\"Polityka_Prywatno\u015bci\" field_type=\"checkbox\" checkbox_options=\"%91{%22value%22:%22Zapozna\u0142em\/\u0142am si\u0119 z polityk\u0105 prywatno\u015bci i zawartymi w niej klauzulami i akceptuj\u0119 jej postanowienia. *%22,%22checked%22:0,%22dragID%22:-1}%93\" fullwidth_field=\"on\" _builder_version=\"4.27.4\" _module_preset=\"default\" form_field_text_color=\"#485060\" border_width_all=\"1px\" border_color_all=\"#485060\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_contact_field][\/et_pb_contact_form][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-252412","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Vishing - CyberForces<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberforces.com\/en\/vishing\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vishing - CyberForces\" \/>\n<meta property=\"og:description\" content=\"Vishing Testing Resilience Against Voice Phishing AttacksCan your employees detect voice-based manipulation? Vishing (voice phishing) is a social engineering method where attackers impersonate IT staff, managers, banks, or institutions to extract information. Vishing tests help assess how vulnerable your organization is to such threats while raising employee awareness and improving their ability to recognize manipulation.What [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberforces.com\/en\/vishing\" \/>\n<meta property=\"og:site_name\" content=\"CyberForces\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TestArmyCyberForces\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-18T22:20:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyberforces.com\/wp-content\/uploads\/critical_threat.webp;\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cyberforces.com\/en\/vishing\",\"url\":\"https:\/\/cyberforces.com\/en\/vishing\",\"name\":\"Vishing - CyberForces\",\"isPartOf\":{\"@id\":\"https:\/\/cyberforces.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cyberforces.com\/en\/vishing#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cyberforces.com\/en\/vishing#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/critical_threat.webp;\",\"datePublished\":\"2025-05-18T22:20:43+00:00\",\"dateModified\":\"2025-05-18T22:20:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cyberforces.com\/en\/vishing#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cyberforces.com\/en\/vishing\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyberforces.com\/en\/vishing#primaryimage\",\"url\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/critical_threat.webp;\",\"contentUrl\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/critical_threat.webp;\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cyberforces.com\/en\/vishing#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/cyberforces.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vishing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cyberforces.com\/#website\",\"url\":\"https:\/\/cyberforces.com\/\",\"name\":\"CyberForces\",\"description\":\"Testy bezpiecze\u0144stwa z TestArmy CyberForces. Testy penetracyjne, hackowanie aplikacji webowych i mobilnych, testy socjotechniczne. Dowiedz si\u0119 wi\u0119cej!\",\"publisher\":{\"@id\":\"https:\/\/cyberforces.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cyberforces.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cyberforces.com\/#organization\",\"name\":\"TestArmy Group S. A.\",\"url\":\"https:\/\/cyberforces.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png\",\"contentUrl\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png\",\"width\":1210,\"height\":173,\"caption\":\"TestArmy Group S. A.\"},\"image\":{\"@id\":\"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/TestArmyCyberForces\/\",\"https:\/\/www.linkedin.com\/company\/cyberforcescom\/\",\"https:\/\/www.instagram.com\/cyberforces__\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vishing - CyberForces","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberforces.com\/en\/vishing","og_locale":"en_US","og_type":"article","og_title":"Vishing - CyberForces","og_description":"Vishing Testing Resilience Against Voice Phishing AttacksCan your employees detect voice-based manipulation? Vishing (voice phishing) is a social engineering method where attackers impersonate IT staff, managers, banks, or institutions to extract information. Vishing tests help assess how vulnerable your organization is to such threats while raising employee awareness and improving their ability to recognize manipulation.What [&hellip;]","og_url":"https:\/\/cyberforces.com\/en\/vishing","og_site_name":"CyberForces","article_publisher":"https:\/\/www.facebook.com\/TestArmyCyberForces\/","article_modified_time":"2025-05-18T22:20:48+00:00","og_image":[{"url":"https:\/\/cyberforces.com\/wp-content\/uploads\/critical_threat.webp;","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cyberforces.com\/en\/vishing","url":"https:\/\/cyberforces.com\/en\/vishing","name":"Vishing - CyberForces","isPartOf":{"@id":"https:\/\/cyberforces.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyberforces.com\/en\/vishing#primaryimage"},"image":{"@id":"https:\/\/cyberforces.com\/en\/vishing#primaryimage"},"thumbnailUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/critical_threat.webp;","datePublished":"2025-05-18T22:20:43+00:00","dateModified":"2025-05-18T22:20:48+00:00","breadcrumb":{"@id":"https:\/\/cyberforces.com\/en\/vishing#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberforces.com\/en\/vishing"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberforces.com\/en\/vishing#primaryimage","url":"https:\/\/cyberforces.com\/wp-content\/uploads\/critical_threat.webp;","contentUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/critical_threat.webp;"},{"@type":"BreadcrumbList","@id":"https:\/\/cyberforces.com\/en\/vishing#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/cyberforces.com\/"},{"@type":"ListItem","position":2,"name":"Vishing"}]},{"@type":"WebSite","@id":"https:\/\/cyberforces.com\/#website","url":"https:\/\/cyberforces.com\/","name":"CyberForces","description":"Testy bezpiecze\u0144stwa z TestArmy CyberForces. Testy penetracyjne, hackowanie aplikacji webowych i mobilnych, testy socjotechniczne. Dowiedz si\u0119 wi\u0119cej!","publisher":{"@id":"https:\/\/cyberforces.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberforces.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cyberforces.com\/#organization","name":"TestArmy Group S. A.","url":"https:\/\/cyberforces.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/","url":"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png","contentUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png","width":1210,"height":173,"caption":"TestArmy Group S. A."},"image":{"@id":"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/TestArmyCyberForces\/","https:\/\/www.linkedin.com\/company\/cyberforcescom\/","https:\/\/www.instagram.com\/cyberforces__"]}]}},"_links":{"self":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/pages\/252412","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/users\/28"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/comments?post=252412"}],"version-history":[{"count":3,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/pages\/252412\/revisions"}],"predecessor-version":[{"id":252416,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/pages\/252412\/revisions\/252416"}],"wp:attachment":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/media?parent=252412"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}