{"id":2849,"date":"2014-02-28T10:54:59","date_gmt":"2014-02-28T10:54:59","guid":{"rendered":"https:\/\/dn-www.azurewebsites.net\/2014\/02\/28\/physical-intrusion-social-engineering\/"},"modified":"2026-03-26T10:49:06","modified_gmt":"2026-03-26T10:49:06","slug":"physical-intrusion-social-engineering","status":"publish","type":"post","link":"https:\/\/dionach.com\/en-us\/physical-intrusion-social-engineering\/","title":{"rendered":"Physical Intrusion Social Engineering"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2849\" class=\"elementor elementor-2849\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3fc94405 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3fc94405\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-494ebae0\" data-id=\"494ebae0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-58ba937a elementor-widget elementor-widget-text-editor\" data-id=\"58ba937a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><div><div><p>Social engineering is a service that my team and I get involved in on a fairly frequent basis. While for the most part this involves remotely trying to convince targets to click on links in emails, browse to fake login pages, download carefully constructed files which lead to remotely accessible shells, or politely asking them for their passwords over the phone (all of which have been successful on multiple occasions), physically obtaining access to a client&#8217;s site is one of the activities that I most look forward to.<\/p><p>There are a number of useful gadgets available to gain physical access to client&#8217;s offices, including devices such as the ubiquitous Proxmark, our own HumblePi and of course a small set of lockpicks. Generally though, all that is needed is a notepad and pen, a cup of coffee, and a good cover story.<\/p><p>Two common cover stories that my team and I have used successfully over the last couple of years include the following:<\/p><h3>1) Meeting Room Mix-Up<\/h3><p>This is personal favourite as it takes advantage of the fact than many companies with multiple offices share meeting spaces, and these frequently get double-booked or changed at short notice. The basic premise is that two people from somewhere other than the target office, for example a member of staff from one office and a client, have a meeting scheduled for the next day. Due to a mix-up, the client is heading to the target office, not to the member of staff&#8217;s actual office, which is a significant distance further away. The member of staff is very apologetic for the very short notice and the inconvenience, and assures the target that any old room will do, and it will only really be for an hour at most. Most of the time, the target will offer an unused office out of a desire to help a colleague in a difficult situation. Most of time that we have used this scenario, the office has provided us with internal network access, unsupervised access to at least one workstation, and in one case, unsupervised access to a cabinet full of customer details.<\/p><h3>2) IT Support Visit<\/h3><p>This is a fairly classical scenario, and takes advantage of the fact that despite the ubiquity of technology in most business, there is still an element of mystery surrounding IT support and the occasional misbehaving update. This one can sometimes be performed with no pre-seeding, and purely turning up at a target site armed with a laptop and a stressed manner is enough. Better results are generally obtained, however, by preparing the target site to receive a visit from the social engineer with a carefully crafted spoof email which mentions a routine visit to address some reported email failures, or a phone call to someone asking them to verify that they can access files on their new &#8220;X-Drive&#8221;. The network share mentioned doesn&#8217;t actually exist, and so the called user will fail to access it. A polite question to check if anyone else has the same problem will lead to an agreement to come round as soon as possible to resolve the problem.<\/p><p>The main reason for the success of the scenarios above is that staff are generally worried about challenging people they don&#8217;t know, or about reporting things that appear suspicious. This is something that any internal security awareness program should tackle as a priority. People who are where they are authorised to be, and doing something that they are authorised to do, will generally not object to being challenged &#8211; provided that the challenge is handled professionally and politely &#8211; and so staff should be encouraged to challenge and to question, and to report anything potentially suspicious using defined internal channels. It should be clear that this is in the aim of improving internal security for the organisation as a whole.<\/p><p>Asking someone for identification when they attempt to enter an office should be a routine practice, and verifying provided details with a trusted source should be encouraged. For example, in either of the scenarios above, calling the attackers claimed office on an internally listed number would have quickly unravelled the social engineer&#8217;s cover story. As an additional precaution, the social engineer could have been asked to provide identification. This should not be relied on as sole verification, however, as identification can be easily faked in most cases.<\/p><p>For more information on social engineering and steps that can be taken to protect against it or to limit its impact and exposure, consider looking at some of our other blog posts, such as:<\/p><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c1d9a8f elementor-grid-2 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-posts--thumbnail-top elementor-widget elementor-widget-posts\" data-id=\"c1d9a8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;classic_columns&quot;:&quot;2&quot;,&quot;classic_columns_tablet&quot;:&quot;2&quot;,&quot;classic_columns_mobile&quot;:&quot;1&quot;,&quot;classic_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:35,&quot;sizes&quot;:[]},&quot;classic_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;classic_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"posts.classic\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-posts-container elementor-posts elementor-posts--skin-classic elementor-grid\" role=\"list\">\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-2806 post type-post status-publish format-standard has-post-thumbnail hentry category-researchblog tag-infrastructure wpbf-post\" role=\"listitem\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/dionach.com\/en-us\/common-internal-vulnerabilities\/\" tabindex=\"-1\" >\n\t\t\t<div class=\"elementor-post__thumbnail\"><img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"512\" src=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2013\/10\/20190731183614-GettyImages-1086701238.jpeg?fit=768%2C512&amp;ssl=1\" class=\"attachment-medium_large size-medium_large wp-image-15500\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2013\/10\/20190731183614-GettyImages-1086701238.jpeg?w=2000&amp;ssl=1 2000w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2013\/10\/20190731183614-GettyImages-1086701238.jpeg?resize=300%2C200&amp;ssl=1 300w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2013\/10\/20190731183614-GettyImages-1086701238.jpeg?resize=1024%2C682&amp;ssl=1 1024w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2013\/10\/20190731183614-GettyImages-1086701238.jpeg?resize=768%2C512&amp;ssl=1 768w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2013\/10\/20190731183614-GettyImages-1086701238.jpeg?resize=1536%2C1024&amp;ssl=1 1536w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><\/div>\n\t\t<\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/dionach.com\/en-us\/common-internal-vulnerabilities\/\" >\n\t\t\t\tCommon Internal Vulnerabilities\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>Common Internal Vulnerabilities<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/dionach.com\/en-us\/common-internal-vulnerabilities\/\" aria-label=\"Read more about Common Internal Vulnerabilities\" tabindex=\"-1\" >\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-2804 post type-post status-publish format-standard has-post-thumbnail hentry category-researchblog tag-social_engineering wpbf-post\" role=\"listitem\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/dionach.com\/en-us\/social-engineering-and-phishing-email-attacks\/\" tabindex=\"-1\" >\n\t\t\t<div class=\"elementor-post__thumbnail\"><img decoding=\"async\" width=\"768\" height=\"432\" src=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2013\/01\/qMM38ks6X9PL59BN9ZieQ6.jpg?fit=768%2C432&amp;ssl=1\" class=\"attachment-medium_large size-medium_large wp-image-12592\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2013\/01\/qMM38ks6X9PL59BN9ZieQ6.jpg?w=970&amp;ssl=1 970w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2013\/01\/qMM38ks6X9PL59BN9ZieQ6.jpg?resize=300%2C169&amp;ssl=1 300w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2013\/01\/qMM38ks6X9PL59BN9ZieQ6.jpg?resize=768%2C432&amp;ssl=1 768w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2013\/01\/qMM38ks6X9PL59BN9ZieQ6.jpg?resize=480%2C270&amp;ssl=1 480w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><\/div>\n\t\t<\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/dionach.com\/en-us\/social-engineering-and-phishing-email-attacks\/\" >\n\t\t\t\tSocial Engineering and Phishing Email Attacks\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>In recent years networks have become more secure through server hardening and deployment of security devices such as firewalls and intrusion prevention systems. This has made it harder for hackers and cyber criminals to launch successful direct attacks from outside of the network perimeter. As a result, hackers and cyber<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/dionach.com\/en-us\/social-engineering-and-phishing-email-attacks\/\" aria-label=\"Read more about Social Engineering and Phishing Email Attacks\" tabindex=\"-1\" >\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Social engineering is a service that my team and I get involved in on a fairly frequent basis. While for the most part this involves remotely trying to convince targets to click on links in emails, browse to fake login pages, download carefully constructed files which lead to&nbsp;<\/p>\n","protected":false},"author":1,"featured_media":12588,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[210],"class_list":["post-2849","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-researchblog","tag-social_engineering","wpbf-post"],"contentshake_article_id":"","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Physical Intrusion Social Engineering<\/title>\n<meta name=\"description\" content=\"Identify real-world security gaps with expert-led intrusion and social engineering tests to strengthen your organisation\u2019s defences.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dionach.com\/en-us\/physical-intrusion-social-engineering\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Physical Intrusion Social Engineering\" \/>\n<meta property=\"og:description\" content=\"Identify real-world security gaps with expert-led intrusion and social engineering tests to strengthen your organisation\u2019s defences.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dionach.com\/en-us\/physical-intrusion-social-engineering\/\" \/>\n<meta property=\"og:site_name\" content=\"Dionach\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/dionachcyber\" \/>\n<meta property=\"article:published_time\" content=\"2014-02-28T10:54:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-26T10:49:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dionach.com\/wp-content\/uploads\/2014\/02\/social-engineering.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dionach Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@dionachcyber\" \/>\n<meta name=\"twitter:site\" content=\"@dionachcyber\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dionach Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/physical-intrusion-social-engineering\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/physical-intrusion-social-engineering\\\/\"},\"author\":{\"name\":\"Dionach Admin\",\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/#\\\/schema\\\/person\\\/e73f3537233924cf4944f7807068b3c8\"},\"headline\":\"Physical Intrusion Social Engineering\",\"datePublished\":\"2014-02-28T10:54:59+00:00\",\"dateModified\":\"2026-03-26T10:49:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/physical-intrusion-social-engineering\\\/\"},\"wordCount\":770,\"publisher\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/physical-intrusion-social-engineering\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/dionach.com\\\/wp-content\\\/uploads\\\/2014\\\/02\\\/social-engineering.jpg?fit=1200%2C630&ssl=1\",\"keywords\":[\"social engineering\"],\"articleSection\":[\"researchblog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/physical-intrusion-social-engineering\\\/\",\"url\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/physical-intrusion-social-engineering\\\/\",\"name\":\"Physical Intrusion Social Engineering\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/physical-intrusion-social-engineering\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/physical-intrusion-social-engineering\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/dionach.com\\\/wp-content\\\/uploads\\\/2014\\\/02\\\/social-engineering.jpg?fit=1200%2C630&ssl=1\",\"datePublished\":\"2014-02-28T10:54:59+00:00\",\"dateModified\":\"2026-03-26T10:49:06+00:00\",\"description\":\"Identify real-world security gaps with expert-led intrusion and social engineering tests to strengthen your organisation\u2019s defences.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/physical-intrusion-social-engineering\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/dionach.com\\\/en-us\\\/physical-intrusion-social-engineering\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/physical-intrusion-social-engineering\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/dionach.com\\\/wp-content\\\/uploads\\\/2014\\\/02\\\/social-engineering.jpg?fit=1200%2C630&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/dionach.com\\\/wp-content\\\/uploads\\\/2014\\\/02\\\/social-engineering.jpg?fit=1200%2C630&ssl=1\",\"width\":1200,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/physical-intrusion-social-engineering\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Physical Intrusion Social Engineering\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/#website\",\"url\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/\",\"name\":\"Dionach\",\"description\":\"Real Security in a Virtual World\",\"publisher\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/#organization\",\"name\":\"Dionach\",\"url\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dionach.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.dionach.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg\",\"width\":512,\"height\":512,\"caption\":\"Dionach\"},\"image\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/dionachcyber\",\"https:\\\/\\\/x.com\\\/dionachcyber\",\"https:\\\/\\\/uk.linkedin.com\\\/company\\\/dionach-ltd\",\"https:\\\/\\\/www.instagram.com\\\/dionachcyber\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/#\\\/schema\\\/person\\\/e73f3537233924cf4944f7807068b3c8\",\"name\":\"Dionach Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g\",\"caption\":\"Dionach Admin\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Physical Intrusion Social Engineering","description":"Identify real-world security gaps with expert-led intrusion and social engineering tests to strengthen your organisation\u2019s defences.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dionach.com\/en-us\/physical-intrusion-social-engineering\/","og_locale":"en_US","og_type":"article","og_title":"Physical Intrusion Social Engineering","og_description":"Identify real-world security gaps with expert-led intrusion and social engineering tests to strengthen your organisation\u2019s defences.","og_url":"https:\/\/dionach.com\/en-us\/physical-intrusion-social-engineering\/","og_site_name":"Dionach","article_publisher":"https:\/\/www.facebook.com\/dionachcyber","article_published_time":"2014-02-28T10:54:59+00:00","article_modified_time":"2026-03-26T10:49:06+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/dionach.com\/wp-content\/uploads\/2014\/02\/social-engineering.jpg","type":"image\/jpeg"}],"author":"Dionach Admin","twitter_card":"summary_large_image","twitter_creator":"@dionachcyber","twitter_site":"@dionachcyber","twitter_misc":{"Written by":"Dionach Admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dionach.com\/en-us\/physical-intrusion-social-engineering\/#article","isPartOf":{"@id":"https:\/\/dionach.com\/en-us\/physical-intrusion-social-engineering\/"},"author":{"name":"Dionach Admin","@id":"https:\/\/dionach.com\/en-us\/#\/schema\/person\/e73f3537233924cf4944f7807068b3c8"},"headline":"Physical Intrusion Social Engineering","datePublished":"2014-02-28T10:54:59+00:00","dateModified":"2026-03-26T10:49:06+00:00","mainEntityOfPage":{"@id":"https:\/\/dionach.com\/en-us\/physical-intrusion-social-engineering\/"},"wordCount":770,"publisher":{"@id":"https:\/\/dionach.com\/en-us\/#organization"},"image":{"@id":"https:\/\/dionach.com\/en-us\/physical-intrusion-social-engineering\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2014\/02\/social-engineering.jpg?fit=1200%2C630&ssl=1","keywords":["social engineering"],"articleSection":["researchblog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/dionach.com\/en-us\/physical-intrusion-social-engineering\/","url":"https:\/\/dionach.com\/en-us\/physical-intrusion-social-engineering\/","name":"Physical Intrusion Social Engineering","isPartOf":{"@id":"https:\/\/dionach.com\/en-us\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dionach.com\/en-us\/physical-intrusion-social-engineering\/#primaryimage"},"image":{"@id":"https:\/\/dionach.com\/en-us\/physical-intrusion-social-engineering\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2014\/02\/social-engineering.jpg?fit=1200%2C630&ssl=1","datePublished":"2014-02-28T10:54:59+00:00","dateModified":"2026-03-26T10:49:06+00:00","description":"Identify real-world security gaps with expert-led intrusion and social engineering tests to strengthen your organisation\u2019s defences.","breadcrumb":{"@id":"https:\/\/dionach.com\/en-us\/physical-intrusion-social-engineering\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dionach.com\/en-us\/physical-intrusion-social-engineering\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dionach.com\/en-us\/physical-intrusion-social-engineering\/#primaryimage","url":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2014\/02\/social-engineering.jpg?fit=1200%2C630&ssl=1","contentUrl":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2014\/02\/social-engineering.jpg?fit=1200%2C630&ssl=1","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/dionach.com\/en-us\/physical-intrusion-social-engineering\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dionach.com\/en-us\/"},{"@type":"ListItem","position":2,"name":"Physical Intrusion Social Engineering"}]},{"@type":"WebSite","@id":"https:\/\/dionach.com\/en-us\/#website","url":"https:\/\/dionach.com\/en-us\/","name":"Dionach","description":"Real Security in a Virtual World","publisher":{"@id":"https:\/\/dionach.com\/en-us\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dionach.com\/en-us\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/dionach.com\/en-us\/#organization","name":"Dionach","url":"https:\/\/dionach.com\/en-us\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dionach.com\/en-us\/#\/schema\/logo\/image\/","url":"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg","contentUrl":"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg","width":512,"height":512,"caption":"Dionach"},"image":{"@id":"https:\/\/dionach.com\/en-us\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/dionachcyber","https:\/\/x.com\/dionachcyber","https:\/\/uk.linkedin.com\/company\/dionach-ltd","https:\/\/www.instagram.com\/dionachcyber\/"]},{"@type":"Person","@id":"https:\/\/dionach.com\/en-us\/#\/schema\/person\/e73f3537233924cf4944f7807068b3c8","name":"Dionach Admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g","caption":"Dionach Admin"}}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2014\/02\/social-engineering.jpg?fit=1200%2C630&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/ph4Ojq-JX","_links":{"self":[{"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/posts\/2849","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/comments?post=2849"}],"version-history":[{"count":1,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/posts\/2849\/revisions"}],"predecessor-version":[{"id":27503,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/posts\/2849\/revisions\/27503"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/media\/12588"}],"wp:attachment":[{"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/media?parent=2849"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/categories?post=2849"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/tags?post=2849"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}