social engineering

Evaluate the security awareness and education of an organization's user population. Using specialized attacks such as "phishing", random phone calls, information gathering, and tailgating, consultants are quickly able to determine where vulnerabilities exist in an organization by exploiting weaknesses in human vulnerabilities.