Once a tester has input this data into Social Mapper, it begins to search for the employee’s online profiles
Information Security company Trustwave will launch an open-source intelligence tool that utilises facial recognition software to correlate social media profiles in order to preform penetration tests.
A robust IT security infrastructure utilises penetration tests and red teams.
Red teams are independent groups that probe your companies IT security to find vulnerabilities in your system.
Part of the testing process is finding and exploiting personal breaches that fail to adhere to the company’s security policy and will open your system to threat actors.
This can be done by tricking the employee on social media into divulging their email or phone number with voucher offers or similar perks.