På Svenska
Hero image

Social engineering

Security testing of the human factor

Social engineering

When the human factor is put to test

Content image

Test the resilience of your organisation

Just like your IT environment, the resistance of your employees needs to be tested at regular intervals. Our experts in social engineering can test your company’s employees and your procedures based on a number of different scenarios that are adapted to your business and the risks that you face.

These simulated attacks can include everything from broad email phishing campaigns to targeted attacks against a specific department or a management group.

Contact us

the service in brief

Tests that show your real weaknesses

Realistic

We combine social manipulation with technical security expertise to conduct attacks that are as realistic as possible

Scenario-based

The attack scenarios are created with clear goals, objectives and limitations and are based on your specific risk scenario

Performed by experts

The attacks are conducted by specialists within the field with the relevant knowledge of the scenarios that your organisation is interested in

Detailed reporting

Clear reporting that provides a current portrait of the situation, recommendations and options for follow-up activities further on

why sentor?

Capacity, competence and experience

Largest

 As the largest pen test provider in Sweden, we can offer a high level of capacity and a broad range of expertise

Specialists

With a specialist group within social engineering we can ensure that you, as a customer, get the expertise you need

Adaptable

We place a lot of value on being sensitive and making adjustments based on the unique needs of your organisation

A few words from one of our clients

“We rely on Sentor to check our websites and applications. We are very satisfied with the work that Sentor has performed over the years and the feedback we received. Clearly a trustworthy security partner.”

Christopher AnderssonCIO at Sevenday Finance

Contact us

We offer several contact routes and provide feedback as soon as possible. If you have sensitive information, we ask you to use the encrypted method.