{"id":42870,"date":"2024-03-26T17:01:47","date_gmt":"2024-03-26T16:01:47","guid":{"rendered":"https:\/\/www.pentestfactory.de\/?page_id=42870"},"modified":"2024-04-17T11:16:42","modified_gmt":"2024-04-17T09:16:42","slug":"phishing","status":"publish","type":"page","link":"https:\/\/www.pentestfactory.de\/en\/phishing\/","title":{"rendered":"Phishing"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"42870\" class=\"elementor elementor-42870 elementor-42869\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section data-eae-particle=\"{\n  &quot;particles&quot;: {\n    &quot;number&quot;: {\n      &quot;value&quot;: 29,\n      &quot;density&quot;: {\n        &quot;enable&quot;: true,\n        &quot;value_area&quot;: 800\n      }\n    },\n    &quot;color&quot;: {\n      &quot;value&quot;: &quot;#ffffff&quot;\n    },\n    &quot;shape&quot;: {\n      &quot;type&quot;: &quot;circle&quot;,\n      &quot;stroke&quot;: {\n        &quot;width&quot;: 0,\n        &quot;color&quot;: &quot;#000000&quot;\n      },\n      &quot;polygon&quot;: {\n        &quot;nb_sides&quot;: 5\n      },\n      &quot;image&quot;: {\n        &quot;src&quot;: &quot;img\/github.svg&quot;,\n        &quot;width&quot;: 100,\n        &quot;height&quot;: 100\n      }\n    },\n    &quot;opacity&quot;: {\n      &quot;value&quot;: 0.5,\n      &quot;random&quot;: false,\n      &quot;anim&quot;: {\n        &quot;enable&quot;: false,\n        &quot;speed&quot;: 1,\n        &quot;opacity_min&quot;: 0.1,\n        &quot;sync&quot;: false\n      }\n    },\n    &quot;size&quot;: {\n      &quot;value&quot;: 3,\n      &quot;random&quot;: true,\n      &quot;anim&quot;: {\n        &quot;enable&quot;: false,\n        &quot;speed&quot;: 40,\n        &quot;size_min&quot;: 0.1,\n        &quot;sync&quot;: false\n      }\n    },\n    &quot;line_linked&quot;: {\n      &quot;enable&quot;: true,\n      &quot;distance&quot;: 150,\n      &quot;color&quot;: &quot;#ffffff&quot;,\n      &quot;opacity&quot;: 0.4,\n      &quot;width&quot;: 1\n    },\n    &quot;move&quot;: {\n      &quot;enable&quot;: true,\n      &quot;speed&quot;: 6,\n      &quot;direction&quot;: &quot;none&quot;,\n      &quot;random&quot;: false,\n      &quot;straight&quot;: false,\n      &quot;out_mode&quot;: &quot;out&quot;,\n      &quot;bounce&quot;: false,\n      &quot;attract&quot;: {\n        &quot;enable&quot;: false,\n        &quot;rotateX&quot;: 600,\n        &quot;rotateY&quot;: 1200\n      }\n    }\n  },\n  &quot;interactivity&quot;: {\n    &quot;detect_on&quot;: &quot;canvas&quot;,\n    &quot;events&quot;: {\n      &quot;onhover&quot;: {\n        &quot;enable&quot;: true,\n        &quot;mode&quot;: &quot;repulse&quot;\n      },\n      &quot;onclick&quot;: {\n        &quot;enable&quot;: true,\n        &quot;mode&quot;: &quot;push&quot;\n      },\n      &quot;resize&quot;: true\n    },\n    &quot;modes&quot;: {\n      &quot;grab&quot;: {\n        &quot;distance&quot;: 400,\n        &quot;line_linked&quot;: {\n          &quot;opacity&quot;: 1\n        }\n      },\n      &quot;bubble&quot;: {\n        &quot;distance&quot;: 400,\n        &quot;size&quot;: 40,\n        &quot;duration&quot;: 2,\n        &quot;opacity&quot;: 8,\n        &quot;speed&quot;: 3\n      },\n      &quot;repulse&quot;: {\n        &quot;distance&quot;: 200,\n        &quot;duration&quot;: 0.4\n      },\n      &quot;push&quot;: {\n        &quot;particles_nb&quot;: 4\n      },\n      &quot;remove&quot;: {\n        &quot;particles_nb&quot;: 2\n      }\n    }\n  },\n  &quot;retina_detect&quot;: true\n}\" class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-44b4b03 elementor-section-content-middle elementor-section-stretched eae-particle-yes elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"67485\" data-id=\"44b4b03\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;shape_divider_top&quot;:&quot;tilt&quot;,&quot;shape_divider_bottom&quot;:&quot;tilt&quot;,&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M0,6V0h1000v100L0,6z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M0,6V0h1000v100L0,6z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1b3a794\" data-eae-slider=\"72026\" data-id=\"1b3a794\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-441f360 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"441f360\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-medium\">Security Audit<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8ff0651 elementor-widget-divider--view-line elementor-invisible elementor-widget elementor-widget-divider\" data-id=\"8ff0651\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-05e5e47 elementor-widget elementor-widget-heading\" data-id=\"05e5e47\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-xxl\">Phishing \/ Social Engineering<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-434be00 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"434be00\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Are your IT systems correctly configured, and are your employees prepared for real phishing or social engineering (SE) attacks? Are your training measures up-to-date and effective in maintaining employee awareness?<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-49d0cc4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"65709\" data-id=\"49d0cc4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d81c0d6\" data-eae-slider=\"44139\" data-id=\"d81c0d6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-inner-section elementor-element elementor-element-357d053 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"99728\" data-id=\"357d053\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-4adc802\" data-eae-slider=\"1098\" data-id=\"4adc802\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7fc8961 elementor-widget elementor-widget-elementskit-heading\" data-id=\"7fc8961\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper center   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title \">Scope of the audit<\/h2>\t\t\t\t<div class='ekit-heading__description'>\n\t\t\t\t\t<p>Phishing and social engineering attacks are diverse and usually exploit human emotions such as curiosity or shame. In addition, technical measures are available to counteract such attacks. In this audit, our experts examine your technical measures (e.g. SPAM filters) as well as the awareness of your employees by means of realistic phishing campaigns.<\/p>\n<p>The following attacks usually take place on a daily basis:<\/p>\n\t\t\t\t<\/div>\n\t\t\t<div class=\"ekit_heading_separetor_wraper ekit_heading_elementskit-border-divider elementskit-style-long\"><div class=\"elementskit-border-divider elementskit-style-long\"><\/div><\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-06627e4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"68989\" data-id=\"06627e4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4b2bc38\" data-eae-slider=\"48146\" data-id=\"4b2bc38\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-inner-section elementor-element elementor-element-56b50fb elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"58636\" data-id=\"56b50fb\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-aab46d1\" data-eae-slider=\"12176\" data-id=\"aab46d1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-17928ea ekit-equal-height-enable elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"17928ea\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text-left text-left icon-lef-right-aligin elementor-animation- media  \">\n                    <div class=\"elementskit-box-header elementor-animation-\">\n                <div class=\"elementskit-info-box-icon  text-center\">\n                    <i aria-hidden=\"true\" class=\"elementkit-infobox-icon fas fa-fish\"><\/i>\n                <\/div>\n          <\/div>\n                        <div class=\"box-body\">\n                            <h3 class=\"elementskit-info-box-title\">\n                    Phishing by e-mail                <\/h3>\n                        \t\t  \t<p>Attackers use a genuine-looking email and sender identity to trick their victims into disclosing sensitive data, carrying out risky actions or executing malicious files.<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-faaea8e\" data-eae-slider=\"77029\" data-id=\"faaea8e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b1be5b5 ekit-equal-height-enable elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"b1be5b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text-left text-left icon-lef-right-aligin elementor-animation- media  \">\n                    <div class=\"elementskit-box-header elementor-animation-\">\n                <div class=\"elementskit-info-box-icon  text-center\">\n                    <i aria-hidden=\"true\" class=\"elementkit-infobox-icon fas fa-sms\"><\/i>\n                <\/div>\n          <\/div>\n                        <div class=\"box-body\">\n                            <h3 class=\"elementskit-info-box-title\">\n                    Phishing via SMS                <\/h3>\n                        \t\t  \t<p>Attackers use genuine-looking text messages to trick their victims into opening malicious links, disclosing sensitive data or downloading and executing malware.<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-inner-section elementor-element elementor-element-c8df9fd elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"2412\" data-id=\"c8df9fd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-e1f9c05\" data-eae-slider=\"42428\" data-id=\"e1f9c05\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4aa1c0c ekit-equal-height-enable elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"4aa1c0c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text-left text-left icon-lef-right-aligin elementor-animation- media  \">\n                    <div class=\"elementskit-box-header elementor-animation-\">\n                <div class=\"elementskit-info-box-icon  text-center\">\n                    <i aria-hidden=\"true\" class=\"elementkit-infobox-icon fas fa-mobile-alt\"><\/i>\n                <\/div>\n          <\/div>\n                        <div class=\"box-body\">\n                            <h3 class=\"elementskit-info-box-title\">\n                    Phone calls                <\/h3>\n                        \t\t  \t<p>Attackers use a fake phone number and caller identity to trick their victims into revealing sensitive data over the phone or carrying out risky actions. This includes, for example, money transfers, the disclosure of customer data or the resetting of sensitive access data at the helpdesk.<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-1844922\" data-eae-slider=\"58784\" data-id=\"1844922\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-42d83c6 ekit-equal-height-enable elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"42d83c6\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text-left text-left icon-lef-right-aligin elementor-animation- media  \">\n                    <div class=\"elementskit-box-header elementor-animation-\">\n                <div class=\"elementskit-info-box-icon  text-center\">\n                    <i aria-hidden=\"true\" class=\"elementkit-infobox-icon fab fa-usb\"><\/i>\n                <\/div>\n          <\/div>\n                        <div class=\"box-body\">\n                            <h3 class=\"elementskit-info-box-title\">\n                    Fake USB sticks                <\/h3>\n                        \t\t  \t<p>Attackers use fake USB sticks that can execute malicious code when inserted. These are strategically placed, e.g. in the employee parking lot or in the lobby, to compromise employee devices. This usually gives an attacker access to the internal company network.<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-c7a3882 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"17356\" data-id=\"c7a3882\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1135a35\" data-eae-slider=\"12691\" data-id=\"1135a35\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5903ca5 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"5903ca5\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"https:\/\/www.pentestfactory.de\/en\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-mail\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">CONTACT US<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-b143f93 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"23280\" data-id=\"b143f93\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_top&quot;:&quot;tilt&quot;,&quot;shape_divider_bottom&quot;:&quot;tilt&quot;,&quot;animation&quot;:&quot;none&quot;,&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M0,6V0h1000v100L0,6z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M0,6V0h1000v100L0,6z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-b56f79d\" data-eae-slider=\"31013\" data-id=\"b56f79d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a4dcafa elementor-widget elementor-widget-elementskit-piechart\" data-id=\"a4dcafa\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"elementskit-piechart.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\">        <div class=\"ekit-single-piechart withcontent\">\n\n            \n            <div class=\"colorful-chart piechart\" data-pie_color_style=\"normal\" data-gradientcolor1=\"\" data-gradientcolor2=\"\" data-color=\"#FFA500\" data-size=\"150\" data-linewidth=\"15\" data-percent=\"82\">\n\n                \n                    <span class=\"ekit-chart-content\">82&#37;<\/span>\n\n                \n                \n                \n\n\n            <\/div>\n            \n            <p>In 82% of cases, a compromise is directly correlated with human error. \u00b9<\/p>\n\n                    <\/div>\n    <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-fda4e9b\" data-eae-slider=\"12140\" data-id=\"fda4e9b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8cc8a1b elementor-widget elementor-widget-elementskit-piechart\" data-id=\"8cc8a1b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"elementskit-piechart.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\">        <div class=\"ekit-single-piechart withcontent\">\n\n            \n            <div class=\"colorful-chart piechart\" data-pie_color_style=\"normal\" data-gradientcolor1=\"\" data-gradientcolor2=\"\" data-color=\"#FFA500\" data-size=\"150\" data-linewidth=\"15\" data-percent=\"100\">\n\n                \n                \n                \n                    <span class=\"ekit-chart-content\">\n                        <i aria-hidden=\"true\" class=\"icon icon-dollar\"><\/i>                    <\/span>\n\n                \n\n\n            <\/div>\n            \n            <p>The average cost of a social engineering attack is $130,000. \u00b2<\/p>\n\n                    <\/div>\n    <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-ac43f1a\" data-eae-slider=\"53738\" data-id=\"ac43f1a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-faa1781 elementor-widget elementor-widget-elementskit-piechart\" data-id=\"faa1781\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"elementskit-piechart.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\">        <div class=\"ekit-single-piechart withcontent\">\n\n            \n            <div class=\"colorful-chart piechart\" data-pie_color_style=\"normal\" data-gradientcolor1=\"\" data-gradientcolor2=\"\" data-color=\"#FFA500\" data-size=\"150\" data-linewidth=\"15\" data-percent=\"54\">\n\n                \n                    <span class=\"ekit-chart-content\">54&#37;<\/span>\n\n                \n                \n                \n\n\n            <\/div>\n            \n            <p>54% of all ransomware attacks are the result of phishing attacks. \u00b3<\/p>\n\n                    <\/div>\n    <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-d305549 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"97289\" data-id=\"d305549\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4dce25d\" data-eae-slider=\"31803\" data-id=\"4dce25d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8c5310d elementor-widget elementor-widget-text-editor\" data-id=\"8c5310d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Our test packages for phishing and social engineering are typically divided into 3 sections:<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-a4cc846 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"45264\" data-id=\"a4cc846\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6a53f13\" data-eae-slider=\"37440\" data-id=\"6a53f13\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0632539 elementor-widget elementor-widget-elementskit-advanced-toggle\" data-id=\"0632539\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"elementskit-advanced-toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"elementkit-toggle-tab-wraper\">\n    <div class=\"elemenetskit-toogle-controls-wraper-outer\">\n        <div class=\"elemenetskit-toogle-controls-wraper\">\n            <div class=\"elemenetskit-toggle-indicator\"><\/div>\n            <ul class=\"nav nav-tabs elementkit-tab-nav\">\n                                    <li data-elementor_current_item=\"elementor-repeater-item-a35cb01\" class=\"elementor-repeater-item-a35cb01 \">\n                        <a class=\"elementskit-toggle-nav-link  active\" id=\"content-a35cb016a04808d44f57-tab\" data-ekit-toggle=\"tab\" href=\"#content-a35cb016a04808d44f57\"\n                        aria-describedby=\"content-a35cb016a04808d44f57\" data-indicator-color=\"\">\n                                                            <span class=\"elementskit-tab-title\">1. technical analysis<\/span>\n                                                    <\/a>\n                    <\/li>\n                                    <li data-elementor_current_item=\"elementor-repeater-item-7b1db2f\" class=\"elementor-repeater-item-7b1db2f \">\n                        <a class=\"elementskit-toggle-nav-link \" id=\"content-7b1db2f6a04808d44f57-tab\" data-ekit-toggle=\"tab\" href=\"#content-7b1db2f6a04808d44f57\"\n                        aria-describedby=\"content-7b1db2f6a04808d44f57\" data-indicator-color=\"\">\n                                                            <span class=\"elementskit-tab-title\">2. awareness analysis<\/span>\n                                                    <\/a>\n                    <\/li>\n                                    <li data-elementor_current_item=\"elementor-repeater-item-e5f35b4\" class=\"elementor-repeater-item-e5f35b4 \">\n                        <a class=\"elementskit-toggle-nav-link \" id=\"content-e5f35b46a04808d44f57-tab\" data-ekit-toggle=\"tab\" href=\"#content-e5f35b46a04808d44f57\"\n                        aria-describedby=\"content-e5f35b46a04808d44f57\" data-indicator-color=\"\">\n                                                            <span class=\"elementskit-tab-title\">3. trainings &amp; workshops<\/span>\n                                                    <\/a>\n                    <\/li>\n                            <\/ul>\n        <\/div>\n    <\/div>\n    <div class=\"tab-content elementkit-toggle-tab-content\">\n                    <div \n            class=\"tab-pane elementkit-toggle-tab-pane elementor-repeater-item-a35cb01  active show\" \n            id=\"content-a35cb016a04808d44f57\" \n            role=\"tabpanel\"\n            aria-labelledby=\"content-a35cb016a04808d44f57-tab\">\n                <div class=\"animated fadeIn\">\n                    \n\t\t<div class=\"widgetarea_warper widgetarea_warper_editable\" data-elementskit-widgetarea-key=\"0632539\"  data-elementskit-widgetarea-index=\"a35cb01\">\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t<div class=\"ekit-widget-area-container\">\n\t\t\t\t\t\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"42873\" class=\"elementor elementor-42873\" data-elementor-post-type=\"elementskit_content\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-565dfe envato-kit-141-top-0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"19420\" data-id=\"565dfe\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-73e99e07\" data-eae-slider=\"87210\" data-id=\"73e99e07\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2879928d elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"2879928d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:50,&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Phishing \/ Social Engineering<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-563810cd elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"563810cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:100,&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Technische Analyse<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-67265117 elementor-widget-divider--view-line elementor-invisible elementor-widget elementor-widget-divider\" data-id=\"67265117\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:150,&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-inner-section elementor-element elementor-element-6782b3e4 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-eae-slider=\"51732\" data-id=\"6782b3e4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:300,&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-422965f4\" data-eae-slider=\"38018\" data-id=\"422965f4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5aad12f elementor-widget elementor-widget-text-editor\" data-id=\"5aad12f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tEine umfangreiche, technische Analyse aller IT-Systeme und Konfigurationen zum Filtern und Blockieren von E-Mails mit gef\u00e4lschten Absenderadressen oder schadhaften Anh\u00e4ngen.\n\nBei dieser Analyse \u00fcbermitteln wir eine Vielzahl an schadhaften Phishing-E-Mails und Anh\u00e4ngen an ein beispielhaftes E-Mail-Postfach von Ihnen. Anschlie\u00dfend untersuchen wir, welche E-Mails ungefiltert durchgereicht wurden und demnach eine Fehlkonfiguration darstellen.\n\nDar\u00fcber hinaus untersuchen wir Ihre SMTP-Mailserver auf folgende Sicherheitskonfigurationen:\n<ul style=\"margin-left: 20px;\">\n \t<li>Einsatz von <a href=\"https:\/\/www.cloudflare.com\/learning\/dns\/dns-records\/dns-spf-record\" rel=\"nofollow noopener\" target=\"_blank\">Sender Policy Framework (SPF)<\/a><\/li>\n \t<li>Einsatz von <a href=\"https:\/\/www.cloudflare.com\/learning\/dns\/dns-records\/dns-dkim-record\/\" rel=\"nofollow noopener\" target=\"_blank\">DomainKeys Identified Mail (DKIM)<\/a><\/li>\n \t<li>Einsatz von <a href=\"https:\/\/www.cloudflare.com\/learning\/dns\/dns-records\/dns-dmarc-record\/\" rel=\"nofollow noopener\" target=\"_blank\">Domain Message Authentication Reporting (DMAC)<\/a><\/li>\n \t<li>Deaktivierung von SMTP-Kommandos wie &#8220;EXPN&#8221; und &#8220;VRFY&#8221;, welche missbraucht werden k\u00f6nnen, um E-Mail-Adressen zu enumerieren oder zu validieren<\/li>\n \t<li>Abwehr von SMTP-Relaying-Angriffen<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-7f168c53\" data-eae-slider=\"33102\" data-id=\"7f168c53\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1c79b032 elementor-invisible elementor-widget elementor-widget-image\" data-id=\"1c79b032\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:350,&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.pentestfactory.de\/wp-content\/uploads\/elementor\/thumbs\/number-sign-blue-street-sign-junk-mailbox-853820-pxhere.com1_-r0tfco2zwlwf8a4roh419c22zmep5zby8bwdwaremq.jpg\" title=\"number-sign-blue-street-sign-junk-mailbox\" alt=\"Spam-Mail\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-64bf22aa elementor-widget elementor-widget-heading\" data-id=\"64bf22aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Eine falsche Konfiguration von SMTP-Servern, Antiviren- oder Antispaml\u00f6sungen k\u00f6nnen es einem Angreifer technisch erlauben, Phishing-Emails mit schadhaften Anh\u00e4ngen einzureichen.<br><br>Ob ein Angriff dann erfolgreich ist, h\u00e4ngt nur noch von der Awareness Ihrer Mitarbeiter ab. Stellen Sie demnach sicher, dass Ihre technischen Ma\u00dfnahmen bereits Phishing unterbinden!<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t                <\/div>\n            <\/div>\n                    <div \n            class=\"tab-pane elementkit-toggle-tab-pane elementor-repeater-item-7b1db2f \" \n            id=\"content-7b1db2f6a04808d44f57\" \n            role=\"tabpanel\"\n            aria-labelledby=\"content-7b1db2f6a04808d44f57-tab\">\n                <div class=\"animated fadeIn\">\n                    \n\t\t<div class=\"widgetarea_warper widgetarea_warper_editable\" data-elementskit-widgetarea-key=\"0632539\"  data-elementskit-widgetarea-index=\"7b1db2f\">\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t<div class=\"ekit-widget-area-container\">\n\t\t\t\t\t\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"42917\" class=\"elementor elementor-42917\" data-elementor-post-type=\"elementskit_content\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-1d56117e envato-kit-141-top-0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"53507\" data-id=\"1d56117e\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-734bd967\" data-eae-slider=\"14775\" data-id=\"734bd967\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1e6c8af7 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"1e6c8af7\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:50,&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Phishing \/ social Engineering<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a49eca2 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"a49eca2\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:100,&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Awareness Analyse<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1bde55bb elementor-widget-divider--view-line elementor-invisible elementor-widget elementor-widget-divider\" data-id=\"1bde55bb\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:150,&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-inner-section elementor-element elementor-element-6dcc275 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-eae-slider=\"9469\" data-id=\"6dcc275\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:300,&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-1a263195\" data-eae-slider=\"15435\" data-id=\"1a263195\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-57f8fd7c elementor-widget elementor-widget-text-editor\" data-id=\"57f8fd7c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In der Awareness Analyse f\u00fchren wir eine m\u00f6glichst realistische&nbsp; Phishing-Kampagne durch, um das Bewusstsein Ihrer Mitarbeiter&nbsp; zu st\u00e4rken. Die Kampagne wird hierbei in Zusammenarbeit mit Ihnen sowie Ihren Anforderungen und W\u00fcnschen konzipiert.<\/p>\n<p><span style=\"font-weight: bold;\">Phishing via E-Mails<\/span><\/p>\n<p>W\u00e4hrend der E-Mail-Phishing-Kampagne k\u00f6nnen messbare Kennzahlen zum folgenden Mitarbeiterverhalten gewonnen werden:<\/p>\n<ul style=\"margin-left: 20px;\">\n<li>\u00d6ffnen der E-Mail anhand eines Tracking-Pixels<\/li>\n<li>\u00d6ffnen von Hyperlinks in der E-Mail auf Nutzerbasis<\/li>\n<li>Eingabe von Informationen in Eingabefeldern<\/li>\n<\/ul>\n<div>Dar\u00fcber hinaus k\u00f6nnen weitere Statistiken ermittelt werden, wie:<\/div>\n<div>\n<ul style=\"margin-left: 20px;\">\n<li>IP-Adresse und Standort des Opfers<\/li>\n<li>Eingesetzter Webbrowser via User-Agent-String<\/li>\n<li>Eingesetztes Betriebssystem via User-Agent-String<\/li>\n<\/ul>\n<\/div>\n<p>Durch die gewonnenen Ergebnisse der Kampagne k\u00f6nnen wir eine messbare \u00dcbersicht \u00fcber die derzeitige Awareness innerhalb Ihrer Organisation oder sogar individueller Abteilungen zu bekommen.<\/p>\n<p>Allgemein ist es m\u00f6glich, die Phishing-Simulation in regelm\u00e4\u00dfigen Abst\u00e4nden mit wechselnden Themen und Herangehensweisen zu widerholen, um einen konstanten Lerneffekt zu erzielen.<\/p><p><span style=\"font-weight: bold;\">Phishing via USB-Sticks<\/span><\/p>\n<p>Neben regul\u00e4ren Phishing-E-Mais k\u00f6nnen auch sogenannte Rubber-Duckies (Fake USB-Sticks) eingesetzt werden. Hierbei erhalten wir messbare Kennzahlen dar\u00fcber, welcher Mitarbeiter, an welchem Ger\u00e4t, in welchem Netzwerkbereich in Ihrem Unternehmen, den USB f\u00e4lschlicherweise eingesteckt hat.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-77543487\" data-eae-slider=\"61282\" data-id=\"77543487\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6593b92d elementor-invisible elementor-widget elementor-widget-image\" data-id=\"6593b92d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:350,&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.pentestfactory.de\/wp-content\/uploads\/elementor\/thumbs\/mail-phishing-scam-spam-spam-mail-hacker-1685658-pxhere.com_-r0tfiq5jy66y1tc0b3dhbt10t0jurrdoeb918hs2j6.jpg\" title=\"mail-phishing-scam-spam-mail-hacker\" alt=\"Phishing (Password Fishing)\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-13d4ce84 elementor-widget elementor-widget-heading\" data-id=\"13d4ce84\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Beim Phishing wird versucht, ein Opfer mittels einer manipulierten Nachricht (E-Mail oder SMS) zu kompromittieren. <br><br>Eine Kompromittierung kann hierbei bedeuten, dass sensitive Daten abflie\u00dfen, kritische Gesch\u00e4ftsprozesse ausgel\u00f6st werden oder Schadsoftware ausgef\u00fchrt wird.<br><br>Stellen Sie sicher, dass Ihre Mitarbeiter geschult sind und wissen, wie man Phishing erkennt und vermeidet.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t                <\/div>\n            <\/div>\n                    <div \n            class=\"tab-pane elementkit-toggle-tab-pane elementor-repeater-item-e5f35b4 \" \n            id=\"content-e5f35b46a04808d44f57\" \n            role=\"tabpanel\"\n            aria-labelledby=\"content-e5f35b46a04808d44f57-tab\">\n                <div class=\"animated fadeIn\">\n                    \n\t\t<div class=\"widgetarea_warper widgetarea_warper_editable\" data-elementskit-widgetarea-key=\"0632539\"  data-elementskit-widgetarea-index=\"e5f35b4\">\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t<div class=\"ekit-widget-area-container\">\n\t\t\t\t\t\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"42923\" class=\"elementor elementor-42923\" data-elementor-post-type=\"elementskit_content\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-3127788 envato-kit-141-top-0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"50518\" data-id=\"3127788\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-1230e7f4\" data-eae-slider=\"66537\" data-id=\"1230e7f4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-26e5085 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"26e5085\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:50,&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Phishing \/ Social Engineering<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7f8d03d5 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"7f8d03d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:100,&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Workshops &amp; Schulungen<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4f5eef85 elementor-widget-divider--view-line elementor-invisible elementor-widget elementor-widget-divider\" data-id=\"4f5eef85\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:150,&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-inner-section elementor-element elementor-element-33c13a2d elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-eae-slider=\"21716\" data-id=\"33c13a2d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:300,&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-2766b38a\" data-eae-slider=\"67476\" data-id=\"2766b38a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7101a267 elementor-widget elementor-widget-text-editor\" data-id=\"7101a267\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Eines der wichtigsten Elemente bei der Pr\u00e4vention von direkten Angriffen gegen Mitarbeiter, ist die richtige Schulung.\u00a0<\/p><p>In Schulungen werden Mitarbeitern Werkzeuge und Indikatoren an die Hand gegeben, um sich bestm\u00f6glich gegen die Angreifer zu behaupten und m\u00f6gliche Bedrohungen bewusst wahrzunehmen.<\/p><p>Workshops k\u00f6nnen unterst\u00fctzen und bieten eine interaktive M\u00f6glichkeit, die Mitarbeiter zum Nachdenken anregt und Ihr Verst\u00e4ndnis f\u00fcr Bedrohungen in der digitalen Welt festigt.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-40b1df96\" data-eae-slider=\"86039\" data-id=\"40b1df96\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-489aedce elementor-invisible elementor-widget elementor-widget-image\" data-id=\"489aedce\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:350,&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.pentestfactory.de\/wp-content\/uploads\/elementor\/thumbs\/desk-technology-boat-ship-vehicle-airline-486228-pxhere.com_-r0tfcm7bixtul27hzgas4cj5sunyql4hk2lexqu6z6.jpg\" title=\"desk-technology\" alt=\"Technische Schulungen\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-51e4e0b0 elementor-widget elementor-widget-heading\" data-id=\"51e4e0b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Gut geschulte Mitarbeiter sind das wichtigste Element in der Pr\u00e4vention von Phishing- und Social-Engineering Angriffen.<br><br>Gerne unterst\u00fctzen wir Sie bei der Ausarbeitung und Durchf\u00fchrung von Schulungen sowie Workshops.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t                <\/div>\n            <\/div>\n            <\/div>\n<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-9abdc6a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"23771\" data-id=\"9abdc6a\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-680c24a\" data-eae-slider=\"41384\" data-id=\"680c24a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6e16ca1 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"6e16ca1\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"https:\/\/www.pentestfactory.de\/en\/configurator\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-settings-2\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">OPEN CONFIGURATOR<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-b7c69da elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"6681\" data-id=\"b7c69da\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5a5a2ca\" data-eae-slider=\"80350\" data-id=\"5a5a2ca\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c189545 elementor-widget elementor-widget-elementskit-heading\" data-id=\"c189545\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_left   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title \">Standards and qualifications<\/h2><div class=\"ekit_heading_separetor_wraper ekit_heading_elementskit-border-divider elementskit-style-long\"><div class=\"elementskit-border-divider elementskit-style-long\"><\/div><\/div>\t\t\t\t<div class='ekit-heading__description'>\n\t\t\t\t\t<p>We follow recognized international standards for our pentest procedure.<\/p>\n<p>Our penetration testers are highly qualified and certified with several recognized hacking certificates.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4bb9b1a elementor-widget elementor-widget-elementskit-client-logo\" data-id=\"4bb9b1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"elementskit-client-logo.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\t\t<div class=\"elementskit-clients-slider slider-dotted dot_dotted simple_logo_image\" data-config=\"{&quot;rtl&quot;:false,&quot;arrows&quot;:false,&quot;dots&quot;:true,&quot;autoplay&quot;:true,&quot;speed&quot;:2500,&quot;slidesPerView&quot;:5,&quot;slidesPerGroup&quot;:1,&quot;pauseOnHover&quot;:true,&quot;loop&quot;:false,&quot;breakpoints&quot;:{&quot;320&quot;:{&quot;slidesPerView&quot;:1,&quot;slidesPerGroup&quot;:1,&quot;spaceBetween&quot;:10},&quot;768&quot;:{&quot;slidesPerView&quot;:2,&quot;slidesPerGroup&quot;:1,&quot;spaceBetween&quot;:10},&quot;1024&quot;:{&quot;slidesPerView&quot;:5,&quot;slidesPerGroup&quot;:1,&quot;spaceBetween&quot;:15}}}\" data-direction=\"\">\n\t\t\t<div class=\"ekit-main-swiper swiper\">\n\t\t\t\t<div class=\"swiper-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementskit-client-slider-item swiper-slide log-separator\">\n\t\t\t\t\t\t\t<div class=\"swiper-slide-inner\">\n\t\t\t\t\t\t\t\t<div class=\"single-client image-switcher\" title=\"OSCP\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.credly.com\/org\/offensive-security\/badge\/offensive-security-certified-professional-oscp\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"content-image\">\n\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"160\" height=\"120\" src=\"https:\/\/www.pentestfactory.de\/wp-content\/uploads\/2021\/04\/OS_OSCP.png\" class=\"\" alt=\"\" title=\"\">\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementskit-client-slider-item swiper-slide log-separator\">\n\t\t\t\t\t\t\t<div class=\"swiper-slide-inner\">\n\t\t\t\t\t\t\t\t<div class=\"single-client image-switcher\" title=\"OWASP\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/owasp.org\/\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"content-image\">\n\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"160\" height=\"120\" src=\"https:\/\/www.pentestfactory.de\/wp-content\/uploads\/2021\/04\/owasp_logo.png\" class=\"\" alt=\"\" title=\"\">\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementskit-client-slider-item swiper-slide log-separator\">\n\t\t\t\t\t\t\t<div class=\"swiper-slide-inner\">\n\t\t\t\t\t\t\t\t<div class=\"single-client image-switcher\" title=\"NIST\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.nist.gov\/information-technology\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"content-image\">\n\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"160\" height=\"120\" src=\"https:\/\/www.pentestfactory.de\/wp-content\/uploads\/2021\/04\/NIST.png\" class=\"\" alt=\"\" title=\"\">\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementskit-client-slider-item swiper-slide log-separator\">\n\t\t\t\t\t\t\t<div class=\"swiper-slide-inner\">\n\t\t\t\t\t\t\t\t<div class=\"single-client image-switcher\" title=\"MITRE\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-image\">\n\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"160\" height=\"120\" src=\"https:\/\/www.pentestfactory.de\/wp-content\/uploads\/2021\/04\/Mitre.png\" class=\"\" alt=\"\" title=\"\">\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementskit-client-slider-item swiper-slide log-separator\">\n\t\t\t\t\t\t\t<div class=\"swiper-slide-inner\">\n\t\t\t\t\t\t\t\t<div class=\"single-client image-switcher\" title=\"CVSS\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.first.org\/cvss\/\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"content-image\">\n\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"160\" height=\"120\" src=\"https:\/\/www.pentestfactory.de\/wp-content\/uploads\/2021\/04\/cvss.png\" class=\"\" alt=\"\" title=\"\">\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementskit-client-slider-item swiper-slide log-separator\">\n\t\t\t\t\t\t\t<div class=\"swiper-slide-inner\">\n\t\t\t\t\t\t\t\t<div class=\"single-client image-switcher\" title=\"OSSTMM\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.isecom.org\/research.html\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"content-image\">\n\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"160\" height=\"120\" src=\"https:\/\/www.pentestfactory.de\/wp-content\/uploads\/2021\/04\/OSSTMM.png\" class=\"\" alt=\"\" title=\"\">\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementskit-client-slider-item swiper-slide log-separator\">\n\t\t\t\t\t\t\t<div class=\"swiper-slide-inner\">\n\t\t\t\t\t\t\t\t<div class=\"single-client image-switcher\" title=\"PTES\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"http:\/\/www.pentest-standard.org\/index.php\/Main_Page\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"content-image\">\n\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"160\" height=\"120\" src=\"https:\/\/www.pentestfactory.de\/wp-content\/uploads\/2021\/04\/PTES_logo.png\" class=\"\" alt=\"\" title=\"\">\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementskit-client-slider-item swiper-slide log-separator\">\n\t\t\t\t\t\t\t<div class=\"swiper-slide-inner\">\n\t\t\t\t\t\t\t\t<div class=\"single-client image-switcher\" title=\"OSWP\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.credly.com\/org\/offensive-security\/badge\/offensive-security-wireless-professional-oswp\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"content-image\">\n\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"340\" height=\"340\" src=\"https:\/\/www.pentestfactory.de\/wp-content\/uploads\/2021\/04\/WiFu-OSWP-badge-e1617867007355.png\" class=\"\" alt=\"\" title=\"\">\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementskit-client-slider-item swiper-slide log-separator\">\n\t\t\t\t\t\t\t<div class=\"swiper-slide-inner\">\n\t\t\t\t\t\t\t\t<div class=\"single-client image-switcher\" title=\"CEH\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.eccouncil.org\/programs\/certified-ethical-hacker-ceh\/\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"content-image\">\n\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"160\" height=\"120\" src=\"https:\/\/www.pentestfactory.de\/wp-content\/uploads\/2021\/04\/ceh.png\" class=\"\" alt=\"\" title=\"\">\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementskit-client-slider-item swiper-slide log-separator\">\n\t\t\t\t\t\t\t<div class=\"swiper-slide-inner\">\n\t\t\t\t\t\t\t\t<div class=\"single-client image-switcher\" title=\"ISO 27001\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-image\">\n\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"160\" height=\"80\" src=\"https:\/\/www.pentestfactory.de\/wp-content\/uploads\/2021\/04\/iso-27001-logo.gif\" class=\"\" alt=\"\" title=\"\">\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementskit-client-slider-item swiper-slide log-separator\">\n\t\t\t\t\t\t\t<div class=\"swiper-slide-inner\">\n\t\t\t\t\t\t\t\t<div class=\"single-client image-switcher\" title=\"CRTP\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.credential.net\/group\/140735\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"content-image\">\n\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"413\" height=\"413\" src=\"https:\/\/www.pentestfactory.de\/wp-content\/uploads\/2021\/04\/CRTP-e1617867056543.png\" class=\"\" alt=\"\" title=\"\">\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementskit-client-slider-item swiper-slide log-separator\">\n\t\t\t\t\t\t\t<div class=\"swiper-slide-inner\">\n\t\t\t\t\t\t\t\t<div class=\"single-client image-switcher\" title=\"OSEP\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.credly.com\/org\/offensive-security\/badge\/offensive-security-experienced-penetration-tester-osep\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"content-image\">\n\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/www.pentestfactory.de\/wp-content\/uploads\/2021\/04\/ETBD-PEN-300-OSEP-badge-e1617868366538.png\" class=\"\" alt=\"\" title=\"\">\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div><!-- .elementskit-clients-slider END -->\n\t\t<\/div>\n\t\t<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-2fb7e162 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"35048\" data-id=\"2fb7e162\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-34b8c3cd\" data-eae-slider=\"44101\" data-id=\"34b8c3cd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6fbdeda3 elementor-widget elementor-widget-elementskit-heading\" data-id=\"6fbdeda3\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_left   ekit_heading_tablet-   ekit_heading_mobile-\"><h4 class=\"ekit-heading--title elementskit-section-title \">Sources<\/h4><div class=\"ekit_heading_separetor_wraper ekit_heading_elementskit-border-divider elementskit-style-long\"><div class=\"elementskit-border-divider elementskit-style-long\"><\/div><\/div>\t\t\t\t<div class='ekit-heading__description'>\n\t\t\t\t\t<p>1 - <a href=\"https:\/\/www.verizon.com\/business\/en-gb\/resources\/2022-data-breach-investigations-report-dbir.pdf\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/www.verizon.com\/business\/en-gb\/resources\/2022-data-breach-investigations-report-dbir.pdf<\/a><\/p>\n<p>2 - <a href=\"https:\/\/www.splunk.com\/en_us\/blog\/learn\/social-engineering-attacks.html\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/www.splunk.com\/en_us\/blog\/learn\/social-engineering-attacks.html<\/a><\/p>\n<p>3 - <a href=\"https:\/\/gitnux.org\/social-engineering-statistics\/\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/gitnux.org\/social-engineering-statistics\/<\/a><\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Security Audit Phishing \/ Social Engineering Are your IT systems correctly configured, and are your employees prepared for real phishing or social engineering (SE) attacks? Are your training measures up-to-date and effective in maintaining employee awareness? Scope of the audit Phishing and social engineering attacks are diverse and usually exploit human emotions such as curiosity [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-42870","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.pentestfactory.de\/en\/wp-json\/wp\/v2\/pages\/42870","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pentestfactory.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.pentestfactory.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.pentestfactory.de\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pentestfactory.de\/en\/wp-json\/wp\/v2\/comments?post=42870"}],"version-history":[{"count":12,"href":"https:\/\/www.pentestfactory.de\/en\/wp-json\/wp\/v2\/pages\/42870\/revisions"}],"predecessor-version":[{"id":43320,"href":"https:\/\/www.pentestfactory.de\/en\/wp-json\/wp\/v2\/pages\/42870\/revisions\/43320"}],"wp:attachment":[{"href":"https:\/\/www.pentestfactory.de\/en\/wp-json\/wp\/v2\/media?parent=42870"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}