• Skip to primary navigation
  • Skip to main content
  • Skip to footer
Logo of Agilient Security Consultants, Australia

Agilient Security Consultants Australia

The Best Security Consultants

Menu
  • Industries
      • Aviation and Airport Security Consultants Australia
      • Defence Industry Security Consulting
      • Government Security Consulting
      • Healthcare & Hospitals Security Consulting
      • Corrections and Detention
      • Maritime Security Consultant
      • Aged Care Facilities
      • Mining, Oil & Gas
      • Public Venues & Events
      • Rail
      • School and Education Security Consultant
      • Telecommunications Security Consultant
      • Utilities
      • Places of Faith and Worship
    • advice-colleagues-communication-newIndustries
  • Services
      • Cybersecurity Consultants
      • Protective Security
      • Business Resilience
      • Building Security Consultants
      • Security Audits
      • Cyber Audits
      • Data
      • Pandemic Planning
      • Azure
      • Electronic Security
      • IT Disaster Recovery Planning
      • Business Continuity Consultants
      • Identity Theft Consultant​
      • Security Consultants
      • Security Camera and CCTV Consultant
      • ISO
      • Duress Alarms
      • Cloud
      • AWS
      • Awareness Training
      • Penetration Testing
      • Security Risk Assessment Consultants
      • Managed Security Service Provider
      • Protection against Vehicles as a Weapon
    • training-1Services
  • Locations
    • Security Consultant Melbourne
    • Security Consultant Sydney
    • Security Consultant Brisbane
    • Security Consultant Adelaide
    • Security Consultant Canberra
    • Security Consultant Perth
  • Resources
    • menumanagers-dealing-customer-agreTraining
    • working-together-newJoin The Tribe
    • Webinars_3-1.jpgUpcoming and Past Events
    • hacking-detected-shutterstock_newResources
  • Articles
  • About
    • About Us
      We are an Australian owned and operated security company specialising in risk, cybersecurity, protective security, crisis and business continuity management services.
    • frequently-asked-questions-smallFAQ’s
    • bg-menu-government-institutionsConsultant Registration
  • Contact Us
Contact Us

Cyber Security Education

You are here: Home / Security News / Cyber Security Education

Catch me if you can – Phishing for Phools

The title refers to the story of Frank Abagnale who before his 19th birthday, successfully forged millions of dollars’ worth of checks through Social engineering exploits while posing as a Pan Am pilot, a doctor, and legal prosecutor as a seasoned and dedicated FBI agent pursues him.

Once again, we are now seeing old fraud exploits perpetrated through new media channels such as email and the internet in general.

Social engineering is the art of psychologically manipulating people into yielding confidential information or conducting specific actions.

Agilient provides Phishing exercises to organisation. This involves Agilient running a test Phishing campaign in your organisation to see who is likely to take the bait. This then enables Agilient to determine the vulnerability of organisations and suggest targeted and customised Social Engineering educational activities.

There are many different types of social engineering; the most common ones are:

  1. Baiting – Baiting is when a hacker leaves (or gives) an infected device in a place where it can be retrieved by the victim. Once the victim plugs the device in their personal computer, they let the intruder in.
  2. Phishing – Phishing occurs when a hacker sends a victim a malicious link that has been sugarcoated to look like a legitimate original one.
  3. Scareware – Using scareware, the hacker tricks the user into believing that their computer has been infected by a malware. They then offer the victim a solution that can remedy their bogus problem; in reality, however, as soon as the user installs the proposed remedy application, they fall prey to the hacker’s social engineering skills.
  4. Email from a friend, boss or colleague. – If a hacker manages to hack or socially engineer one person’s email password they have access to that person’s contact list–and because most people use one password everywhere, they probably have access to that person’s social networking contacts as well. Once the hacker has that email account under their control, they send emails to all the person’s contacts or leave messages on all their friend’s social pages, and possibly on the pages of the person’s friend’s friends.
  5. Response to a question you never asked – Hackers may pretend to be responding to your ’request for help’ from a company while also offering more help. They pick companies that millions of people use like a software company or bank.  If you don’t use the product or service, you will ignore the email, phone call, or message, but if you do happen to use the service, there is a good chance you will respond because you probably do want help with a problem.
  6. Creating distrust – Some social engineering, is all about creating distrust, or starting conflicts; these are often carried out by people you know and who are angry with you, but it is also done by nasty people just trying to wreak havoc, people who want to first create distrust in your mind about others so they can then step in as a hero and gain your trust, or by extortionists who want to manipulate information and then threaten you with disclosure. This form of social engineering often begins by gaining access to an email account or other communication account on an IM client, social network, chat, forum, etc. They accomplish this either by hacking, social engineering, or simply guessing weak passwords.

As mentioned earlier, social engineering can only be mitigated by offering people training and awareness on the matter.

Agilient provides customised and comprehensive training on help staff to become socially aware and assist the organisation in preventing social engineering.

Want to learn more? The Agilient Security Awareness Program brings our cybersecurity education to the workplace.

Our highly interactive program can help you decrease phishing attacks and addresses the security and compliance needs of health, finance, retail, manufacturing, logistics and consulting corporations, government departments and agencies, state and local governments and educational institutions.

Some highlights include:

  • Interactive exercises
  • Known exploits and case studies
  • Conducting a cybersecurity risk assessment
  • Preventative measures
  • Monitoring for cybersecurity attacks
  • Reporting and dealing with cybersecurity attacks

For further information on social engineering and services we provide to help mitigate all types of malicious activity do not hesitate to contact Agilient.

The Agilient Team

Tweet
Share

Security News

Looking for a security partner? Get in touch with Agilient.

Looking for practical and cost-effective security and risk solutions for your government department, agency or company? Speak with Australia’s leading senior security, risk and resilience experts.


Looking for a pandemic planning partner? Get in touch with Agilient.

Looking for practical and cost-effective risk management solutions for your government department, agency or company? Speak with Australia’s leading senior risk and emergency management experts.



Footer

Agilient is a proud member of

Ai Group Defence Council
Australian Industry & Defence Network
Australian Security Industry Association
Sydney Aerospace & Defence Interest Group

Company and Licensing Details:

ABN: 37 157 911 441
NSW Security Master Licence # 410783087
ACT Security Master Licence # 17502184
Vic Security Registration # 878-460-40S
Qld Security Firm Licence # 3834422

Join The Tribe

Sign up to receive our regular Agilient newsletter including the latest security, risk and resilience updates

Sign up now

Copyright © 2025 Agilient – Level 14, 275 Alfred St, North Sydney NSW 2060 Australia – 1300 341 692

Our Services

Security Consultant

Security Consultant Sydney

Security Consultant Melbourne

Security Consultant Canberra
Security Consultant Perth

Security Consultant Adelaide

Security Consultant Brisbane