Security risk of USB sticks given as gifts or lying around
Hackers are a good judge of character. They exploit people’s helpfulness, insecurity and credulity for their attacks, and in the case of attacks using USB sticks, they also exploit curiosity and the joy of receiving a gift.
USB sticks are practical – unfortunately also for hackers
The USB sticks that your employees receive from us as promotional gifts or that are deliberately left somewhere (e.g. with the note “Photos company party”) have been prepared. Not by hackers, but by us. As soon as one of these sticks is used on a PC, notebook or tablet in your company, our IT security specialists are informed.
Do your employees know that USB sticks can be a security risk? Are there appropriate guidelines in your company that regulate the use of USB sticks? The USB stick hacker attack simulation answers these questions.
Your benefit
You will learn,
- whether your employees are sensitised to the security risk of USB sticks.
- You recognise the need for further awareness-raising measures.
- You reduce the risk of your company falling victim to a hacker attack.
Speaking of phishing
In addition to the hacker attack simulation via USB stick, we also offer the following social engineering services and other related services on this topic:
- Phishing simulation by telephone
- Phishing simulation via e-mail and SMS
- Phishing simulation via Deepfakes
- Social engineering on site
- Live hacking
- eLearning modules on phishing by e-mail, SMS and telephone
- eLearning modules on the topic of social engineering