• SecurePath for Auto Dealers
  • Services
    • SOC Reporting Services
      • SOC 2® Readiness Assessment
      • SOC 2® Reports
      • SOC 3® Reports
      • SOC for Cybersecurity® Reports
    • IT Advisory Services
      • IT Vulnerability Assessment
      • Network Penetration Testing
      • Privileged Access Management
      • Social Engineering Testing
      • Virtual CISO (vCISO)
      • Written Information Security Program (“WISP”)
      • IT General Controls Audit & Compliance
    • IT Government Compliance
      • CMMC Cybersecurity Services & Compliance
      • DFARS Compliance
      • FTC Safeguards Compliance
  • Industries
    • Financial Services
    • Government
    • Auto Dealerships
    • Enterprise
  • Blog
  • About Us
    • Meet The Team
    • Jobs
  • Contact Us

Call us today! 844-OCD-TECH

Find our Location
OCD TechOCD Tech
  • SecurePath for Auto Dealers
  • Services
    • SOC Reporting Services
      • SOC 2® Readiness Assessment
      • SOC 2® Reports
      • SOC 3® Reports
      • SOC for Cybersecurity® Reports
    • IT Advisory Services
      • IT Vulnerability Assessment
      • Network Penetration Testing
      • Privileged Access Management
      • Social Engineering Testing
      • Virtual CISO (vCISO)
      • Written Information Security Program (“WISP”)
      • IT General Controls Audit & Compliance
    • IT Government Compliance
      • CMMC Cybersecurity Services & Compliance
      • DFARS Compliance
      • FTC Safeguards Compliance
  • Industries
    • Financial Services
    • Government
    • Auto Dealerships
    • Enterprise
  • Blog
  • About Us
    • Meet The Team
    • Jobs
  • Contact Us

Social Engineering Testing

Home Social Engineering Testing

Mitigating Social Engineering Threats

66% OF SECURITY COMPROMISES ARE THE RESULT OF EMPLOYEE ERROR!

Social Engineering involves the psychological manipulation of people to disclose critical information about themselves or their companies. This manipulation often involves confidence tricks, or “cons” to deceive the mark. The field of social engineering comprises.

OCD Tech offers Social Engineering services to clients. Our approach consists of impersonating would-be hackers, sending deceptive emails to your staff, attempting to get them to click links and download attachments.

We can manage the phishing for you – or you can, through a custom portal.
 

OCD Tech specializes in making sure employees understand the mechanisms of spam, phishing, spear-phishing, malware, and social engineering. You get high quality web-based interactive training combined with common traps, live demonstration videos, short comprehension tests, and scenario-based Danger Zone exercises. When it comes to rolling out training for your users, our platform’s Automated Training Campaigns do the heavy lifting for you.

GAIN INSIGHT INTO YOUR ORGANIZATION AND ITS USERS WITH OUR FREE TOOLS!

Phishing Security Test
Social Media Phishing Test
Phishing Reply Test
Domain Doppelganger Test
Domain Spoof Test
Breached Password Test

Social Engineering Phishing Test

OCD Tech’s highly effective scheduled Phishing Security Tests keep your employees on their toes with security top of mind. Within the Admin Console, you are able to schedule regular Phishing Security Tests from our large library of known-to-work templates or choose a template from the community templates section where you can also share phishing templates with your peers.

Baseline testing

We provide baseline testing to assess your phish-prone staff.

Train Your Users

On-demand, interactive, engaging training with common traps and live demos.

Phish Your Users

Fully automated simulated phishing attacks and hundreds of templates with unlimited usage.

See the results

Enterprise-strength reporting, showing stats and graphs for both training and phishing, ready for management.

Social Engineering Service Tiers

All of the services listed in the table are available for a full year, on an ongoing basis. The number, frequency, and type of tests cam be customized based on client needs. We provide three distinct service tiers, which vary based on the level of testing and training required.

Social Engineering Services

HOW DOES OCD TECH’S SOCIAL ENGINEERING PLATFORM WORK?

How do you price this service?

Our pricing is roughly based upon the number of seats and the tier of service desired, though we also factor in the time and effort required to complete the engagement.

Is all the training online or do you perform some of it in person?

We offer both online and in-person training. Contact us for a custom quote that’s tailored to your needs.

What is Vishing?

Vishing is the act of using a telephone to attempt to scam or cheat an individual into giving up private information.

What else can you tell me about your online training options?
  • Our online platform does a lot of the heavy lifting for you.
  • On-demand, browser-based training featuring “The World’s Most Famous Hacker”
  • Multiple awareness training modules available
  • Create multiple training campaigns as ongoing or with a specified completion date
  • Automated enrollment and follow-up emails to ‘nudge’ users who have not completed their training
  • Auto-enroll new users added to a group or company
  • Point-of-failure training auto-enrollment
  • Dedicated Hosting Options, or run the course in your own LMS
What else can you tell me about the phishing tools that you offer?

Our hosted platform offers a number of approaches and templates that can be used in simulated phishing attacks. Some of the features of our platform include:

  • Unlimited year-round simulated phishing attacks
  • Full library of successful phishing templates
  • Easily create your own templates
  • Customizable landing pages
  • Customizable “hover-links” when a user mouses over
  • Tests for opening MS Office attachments and secondary action of enabling macros
  • Set-it-and-forget-it scheduling of attacks and campaign length
  • “Anti-Prarie dog” campaigns that send random templates at random times preventing users warning each other
  • Phish Alert Outlook add-in button gives your users a way to report simulated and non-simulated phishing attacks
  • Vishing Security Tests using IVR attacks over the phone

CONTACT US

Find us on

Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.

Send Message
OCD Tech logo Audit. Security. Assurance.

IT Audit | Cybersecurity | IT Assurance | IT Security Consultants – OCD Tech is a technology consulting firm serving the IT security and consulting needs of businesses in Boston (MA), Braintree (MA) and across New England. We primarily serve Fortune 500 companies including auto dealers, financial institutions, higher education, government contractors, and not-for-profit organizations with SOC 2 reporting, CMMC readiness, IT Security Audits, Penetration Testing and Vulnerability Assessments. We also provide dark web monitoring, DFARS compliance, and IT general controls review.

Contact Info

  • OCD Tech
  • 25 BHOP, Suite 407, Braintree MA, 02184
  • 844-623-8324
  • https://ocd-tech.com

Follow Us

Videos

Check Out the Latest Videos From OCD Tech!

Services

SOC Reporting Services
– SOC 2 ® Readiness Assessment
– SOC 2 ®
– SOC 3 ®
– SOC for Cybersecurity ®

IT Advisory Services
– IT Vulnerability Assessment
– Penetration Testing
– Privileged Access Management
– Social Engineering
– WISP
– General IT Controls Review

IT Government Compliance Services
– CMMC
– DFARS Compliance
– FTC Safeguards vCISO

Industries

  • Financial Services
  • Government
  • Enterprise
  • Auto Dealerships

© 2025 — OCD Tech: IT Audit - Cybersecurity - IT Assurance

  • OCD Tech
  • About Us
  • Contact Us