Social Engineering Hardening

A Company presents an “attack surface” to potential hackers. In English, “attack surface” is all of the areas of exposure for a company – laptops, desktops, mobile devices, networks, website, etc. The most vulnerable attack surfaces are often endpoints in the hands of users. That’s why so many attacks start with social engineering efforts on users.  We offer several solution options to help you build a human firewall.

To receive a complimentary copy of “Hacked. Screwed. Gone – an A-Z Blueprint to Protect Your Business from Accidental & Malicious Information Security Threats’ by Teraverde President Jim Deitch, CPA, CMB and / or a FREE Phishing test, click the book below.


Q.) We currently test our employees for phish susceptibility.  Why do we need to speak with Teraverde?

A.) What we do is different!  Not only do we provide year-round phishing and training campaign(s) but we also leverage our mortgage industry knowledge and experience from our hundreds of mortgage banker clients, thereby affording an additional layer of protection based on what we see as the most current attacks specific to your mortgage banker peer group.

Q.)My IT Department and CIO are satisfied with the programs currently implemented and don’t need help.

A.) IT Departments are often the most understaffed at an institution and hence this exposes the institution to the greatest economic and reputational harm (from a breach). The cost of implementing Teraverde’s cybersecurity programs is far less than the cost of a ransomware attack or data breach!   CIO’s typically won’t tell a CEO “sorry - our IT department is going to be breached”.  Instead, they typically tell a CEO the “systems are well protected”.  Too many CEO’s think their system is protected better than it really is.

Q.) My regulator has not cited my cybersecurity program as inadequate. 

A.) Regulators are cracking down and it is best to be ahead of them with regard to regulatory requirements.  As cybersecurity concerns nationwide are in the news daily, your regulator already (or will) expect a robust cybersecurity program.

Q.) Is your service expensive?   We did not budget for it.

A.) A breach, crypto-locker ransomware and/or regulatory consent orders are far more expensive than our fees! To quote John Ruskin “…  The common law of business balance prohibits paying a little and getting a lot - it can't be done. If you deal with the lowest bidder, it is well to add something for the risk you run, and if you do that you will have enough to pay for something better.”