Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise ServicesSecurity Leadership and ManagementCybersecurity News

Social Engineering Simulation Testing Tips

By Joe Malec
vishing
May 8, 2019

Do you know who is calling you?  In many cases, employees rely on caller ID or a familiar name to allow callers to build trust and potentially exploit them. Vishing (or social engineering) is a practice where verbal communication is used to deceive a potential victim.  Similar to phishing, the aim is to compel an individual to either provide information or take an action, which can be used for network penetration or identity theft.  The problem is so pervasive, the IRS listed phone scams as number two on its list of Dirty Dozen threats. This trend is may not ease up soon. Financial Fraud Action UK noted in their 2017 Fraud the Facts report that there was a two percent increase in all fraud types in 2016 including themes involving impersonation and deception.

As this threat continues to grow, some organizations are integrating vishing simulation testing into their security awareness programs to build resistance to this threat among the population.

 

Options

There are different approaches getting started.

Purchase: This can include either buying a script or an automated system that essentially rob calls employees to try to obtain information or convince them to take an action.  Even though you can reach more targets with robo-calls, they may be less effective because they are not humans on the other end of the line.  In addition, prewritten scripts may not be very adaptable to your organizations environment.  

Build: This involves creating the framework, which includes developing the strategy, script and goals. Although time consuming and difficult to implement, it allows you the flexibility to build something specific to your organization. That is where the rest of this article is focused along with the phases of development and rollout.

 

Strategy

Vishing campaigns need to be carefully crafted to ensure success. This requires planning and a basic understanding of the types of threats and the human reaction to strangers. Here are some elements to include in the strategy:

  • Goal: What do you want the campaign to accomplish?  Is there a specific outcome you want to measure?  Has your organization been exposed to certain threats that you want to the population train on?
  • Scenario: What is the topic that is going covered in the campaign?  For example, the topic could be end of year asset audit or a software update.
  • Main flag(s): What specific information or action should be captured in the campaign (e.g. employee name, employee number, MAC address, clicking on a URL)?
  • Secondary Flags: This can be optional information collected depending on how the call goes and may or not be related to the scenario.
  • Target: What team or department will be the focus? 

 

When first starting out, keep the strategy simple. There will be a lot of lessons-learned and you can build complexity as you gain experience.

  

Developing the script

Similar to phishing, there are elements of the communication that will need to be developed and refined. 

This can be in different forms but one option is the following:

  • Introduction: This includes the greeting and helping the target understand who you are. Done correctly, this helps to put the target at ease so you can proceed to the next stage.
  • Reason for Calling: A sense of authority is important.  Provide background on why you are calling them.  You can even allude to an existing business relationship. You can potentially start collecting some of the flags at this stage such as name and employee number.
  • Ask: Here is where you start focusing on the flags to be collected.  Once the target understands, who is calling them and why, it is time to gather as much information as possible.  Examples include system information and hardware and software used at the company.
  • Sense of urgency: Depending on the cooperation level of the target and the scenario, you may need to give a deadline for collecting the information you need.  In some cases, the pressure can potentially lead to improved cooperation.  Mentioning that you are calling about a technology audit could be a good fit. 
  • Conclusion: Having a decisive and positive end to the call is important.  Thanking the target for the information helps alleviate their suspicion level whether they were cooperative or not.

 

Once again, simplicity rules the day.

 

Objections and responses

Brainstorm on potential positive and negative responses to the various stages of the call.  You could get questions such as “what’s your name, again?” or “I am uncomfortable providing you the requested information.”  Have believable responses ready in these cases.  Also, objections can provide opportunities to collect flags.  Let’s say that the target tells you that they will need to talk to their supervisor before providing any information.  Ask the target their supervisor’s name, number and email address and offer to contact them directly.  

 

Stakeholders

Before executing the campaign, obtain buy-in from organizational stakeholders. This would commonly be the same (or similar) to the stakeholders who approve the phishing program.  Potential stakeholders can be Information Security leadership, HR, Legal, Helpdesk, Compliance, Privacy and Corporate Security.

 

Execution

When starting out, a good target area is one that regularly interfaces with the employees or the public such as the helpdesk or customer service. The number you call from needs to be considered as well.  The telephony team can assist with masking (spoofing) the originating number especially if it is from a conference room.  Keep the sample size low, 15-20 since these calls can be time consuming and changes to the script may be need to be made depending on the responses.  

 

Metrics

Being able to measure the results of the program are critical to understanding the nature of the risks posed by social engineering to the organization and determining the effectiveness of the security awareness campaign messaging. 

 

Types of metrics to collect during the campaign can includes:

  • Time of Week/Day compromise rate to determine if certain days work better than others do.
  • Compromise rate by month to identify trends. 
  • Compromise rate by department/team.                                          
  • Compromise by gender (female targeting female, female targeting men, men targeting men, men targeting women.)
  • Persuasion methods most effective such as urgency vs. authority.  

 

Considerations

  • Don’t overreach.  Decide on a specific set of flags that coincide with the scenario, especially if you are new to the program.
  • Be flexible.  Calls typically don’t go the way they are planned and being ready for unexpected responses is helpful.
  • In addition to creating the script, drafting a call flow chart can help visualize the campaign and identify potential issues or gaps.

 

After each campaign review what did and did not go well with the campaign. You may find that certain departments are more risk sensitive or certain scenarios are more believable than others are. The results can be used to tweak the program for continual improvement.

 

This article originally ran in Today’s Cybersecurity Leader, a monthly cybersecurity-focused eNewsletter for security end users, brought to you by Security magazine. Subscribe here.

KEYWORDS: identity theft penetration testing social engineering

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Joemalec
Joe Malec is a Senior Security Analyst with 18 years of experience in information security. He is also a fellow with the ISSA.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • laptop open to gmail

    AI's role in future advanced social engineering attacks

    See More
  • SEC0919-Mobile-Feat-slide1_900px

    Can the Tsunami of Phone-Based Social Engineering be Contained?

    See More
  • social engineering attacks and how to thwart them

    Avoid social engineering attacks and protect employees

    See More

Related Products

See More Products
  • Optimizing Social Media from a B2B Perspective

  • 9781138378339.jpg

    Surveillance, Crime and Social Control

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing