Home
Small Groups or 1:1
Begin with EXPLOITATION in mind - Be aware that all may not be as it appears!
By explaining how people are coerced (Socially Engineered/Exploited) into giving away access to systems or transferring money, we 'verbally inoculate' and create memories that help the subconscious spot anomalies it is being encouraged to overlook!
Begin with EDUCATION in mind - Fraud relies heavily on the victim not knowing what is possible both technically and emotionally
Most successful compromises were only possible because the person targeted wasn't aware of what was technically possible. The underlying techniques go back hundreds of years but in this digital world, the tools have changed.
Begin with EVIDENCE in mind - Look for proof whilst being encouraged to overlook inconsistencies
Compromise relies on the user not questioning what they are being told, the identity of the person saying it and feeling that pausing the process isn't possible.
Begin with EXPERIENCE in mind - Story telling & role play create deep seated memories & emotions that are recalled when needed
We explain by example what is technically possible and how fraudsters use familiarity of systems and processes to remove suspicion and hide their techniques. Most of all we teach users that it is always they who are in ultimate control and that there is 'Power in a Pause!'
Begin with ENGINEERING in mind - Are you being gently but persuasively walked through a process
Understand what Social Engineering is and how to spot it being used. Our minds often fill in the gaps in generic information or volunteer more information than we should.
Begin with EXFILTRATION in mind - Be aware of how information both public and private is used to legitimise fraudsters
What information are you or your organisation putting online or giving away privately during reconnaissance calls/emails by fraudsters.