
The following is based on real events; names and other details have been changed to maintain confidentiality and protect the innocent.
When anyone mentions cyber security and information security , many of us immediately think of the internet and criminals hacking our networks. We're right to think like this, but we're forgetting something equally as important: physical security, which is just as likely to come under attack. This is where our tricky trio above come in. They're all experienced consultants and regularly test the physical security of clients, while others investigate logical security.
By the time you meet them, they've already done a lot of work: online reconnaissance using the client's website, LinkedIn (and other social media), public company information and a general internet trawl to garner details of directors, staff, offices - including managed buildings, departmental structure, leadership team, current and past projects, clients, supply chain, investors, annual reports, general news and potentially much more. A thorough trawl indeed.
Next step: they'll visit your offices and, without stepping foot inside, check out barriers, receptionists, use of proximity cards, ID badges, specific lanyard colours and designs, public areas, shared office space, all the entrances to the building and who they're used by, contractor access, car parks, where staff go for coffee and lunch, busy and quiet times, windows which give internal views, even down to how you call the lifts and how many staff head to each floor. A long list of things that is certainly not exhaustive. They'll easily be able to identify areas of poor security and the rate at which controls are bypassed, such as tailgating or opening doors for others and not checking identification.
Meet the consultants Let's introduce you to Tom. Tom is a very nice guy, young, keen, always smiling. Tom's target? A small, merchant bank in the city. When he arrives, he's got company ID that looks legitimate, knows where he's going, and looks confident. With his phone to his ear and clutching two laptop bags, he arrives with a group of others and silently indicates his hands are full and if you don't mind opening the door for him ? Tom stands by the lifts still talking on the phone, watching as someone waves their proximity card in front of the screen to call the lift and presses the button for the fifth floor - Tom's destination. He jumps into the lift, still on the phone, and mouths thanks'. Tom knows the fifth floor is where the finance department is (from the reconnaissance phase, remember?), he exits the lift and walks in the opposite direction to the other person. Rounding a corner, he spots a half-empty hot-desking area. Ending his fictitious phone call, he quickly gets a laptop out of one of his bags and sets up. Someone wanders up behind him and says hello. Tom isn't fazed. He turns around, says hi and introduces himself, explaining that he's working on the company's latest marketing campaign and is usually based in the Edinburgh office. They chat some more. His audience is instantly at ease, they're in finance so know nothing about marketing but it's obvious that Tom is genuine, he knows all about the way the bank operates. Tom asks where the finance director's office is as he needs to speak to him later. The office is pointed out to him, and the employee is thanked for their help. After a few minutes, Tom leaves his laptop and goes to the bathroom where he hides until lunch. When he re-emerges, the office is quiet, he picks up his laptop - it was never switched on and contains no data anyway - and walks to the office of the FD. Nobody is around, but the FD's laptop is on the desk. Quickly but confidently Tom picks up the laptop, disconnects the cables, and puts it in his second bag. Ostensibly making arrangements for lunch on his phone he leaves, using the same techniques to get out as he did to get in.
Consultant number two Dick's target is a utility company site. He arrives wearing a hard hat and high vis jacket over a suit, he looks the part and most certainly like he's supposed to be there. If anyone asks, he's here to do an inspection and is usually based at head office, so unfamiliarity with the site is expected. He uses the car park exit, which he knows is not observed, to enter the site. Dick reaches the unmanned reception area but now needs to get through the locked door. Luckily, he spots a worker outside and introduces himself, spinning his prepared story and needs to be let through. He apologises for not having his official photo ID but does have a business card - with the company logo and address - which he presents. They share a laugh when Dick suggests his identity can be confirmed by calling the mobile number on the card and checking if his phone rings. This worker is impressed by Dick's friendliness and air of authority and is only too pleased to let Dick through the door! Once inside, Dick can wander through most of the building, being careful to keep away from areas where senior staff and managers are so he's not questioned. He takes photos of any documentation, internal information and security controls he finds. He also unplugs a USB memory stick from a workstation before exiting the building using another door which opens from the inside and is soon off the site.
and consultant number three Harriet's target is a technology start-up. They're based in a shared office which has very lax security: no IDs are worn, the reception is unmanned, the secure doors are propped open, and everyone inside is so used to strangers passing through they have no problem with opening doors for Harriet - how useful. She's young, vibrant and has a cheery thank-you for everyone as she qu
More from Eurofins
25/03/2025
By Antonio Russu, Global Head of Cyber Security
25 March 2025 When you think about the omnipresent cyber threats today and how it affects companies across a...
03/03/2025
Hasselt, Belgium, 3 March 2025 - Resillion, a leading provider of Quality Engineering (QE) and cyber security globally, has formed a strategic partnership with...
25/02/2025
24 February 2025 As cyber threats become increasingly sophisticated and pervasive, banking, financial services and insurance (BFSI) institutions must adopt ro...
21/02/2025
21 February 2025 In the rapidly evolving world of smart home technology, Matte...
18/02/2025
18 February 2025 Today's cyber security landscape is more volatile than ever, with digital transformation and cloud adoption rapidly expanding the attack ...
11/02/2025
11 February 2025 Digital banking has transformed the way financial services are delivered, providing customers with seamless access to their assets and invest...
03/02/2025
In an era where technology is advancing faster than ever, the simple act of char...
24/01/2025
We're excited to share some fantastic news! Resillion will be one of the first two labs to support the Ki Certification, the new industry standard from the ...
09/01/2025
By Fan Zang, Testing Operations Director
In early December 2024, the Resillion team, in partnership with the NERC DTV team, hosted an eventful week-long tour a...
29/11/2024
By Robby Putzeys, Global Head of Software Testing Practice
AI-generated code is...
15/11/2024
By Sarah Formosa, Head of Digital Forensics Resillion
At Resillion, we're...
24/10/2024
Real-world trials of smart energy technologies that help households and business...
14/10/2024
By Uri Bar-El, Head of Cyber - Resillion
The evolution of cyber security
The rise of artificial intelligence (AI) has ushered in a new era of possibilities, t...
01/10/2024
by Bob Campbell, Head of Technology
Our expert Bob Campbell, Head of Technology, Strategy and Partnerships delves into the key insights from IBC 2024, reflecti...
14/08/2024
Discover how our streamlined pen testing services revolutionise cyber security by delivering fast, efficient, high-quality results.
In today's digital land...
14/08/2024
An interesting trend in China's automotive sector has surfaced, particularly regarding electric vehicles (EVs), which could spread and become relevant to th...
24/06/2024
Resillion was honoured to host the partner event for the Belgium and Netherlands Testing Qualifications Board (BNTQB) on the 6th of June at our office on the Co...
13/05/2024
Wireless charging is evolving, and the Wireless Power Consortium (WPC) is keeping pace with the recent launch of two updates to its charging standards - Qi2 v2....
06/05/2024
The recent Embedded World N rnberg 2024 event gathered together the key players in the future of embedded electronics to showcase innovations and scope out the ...
24/04/2024
Belgium has taken a significant step forward in bolstering its cyber security framework with the recent adoption of the NIS2 law by the House of Representatives...
08/04/2024
Resillion and Fraunhofer IIS have collaborated to create MPEG-H Audio Test Material packaged as ATSC 3.0 streams for receiver testing. MPEG-H Audio is in use in...
04/04/2024
by Bob Campbell, Director of Engineering, Resillion
The recent International Pl...
29/03/2024
In our latest #QAInsights initiative, we described the current state of AI-driven test automation. If you want to review this post, please go to: https://www.re...
29/02/2024
by Bob Campbell, Director of Engineering, Resillion
This year's Outside the Box' event hosted by Everyone TV, featured a range of speakers looking to ...
29/02/2024
by Rajinder Kumar, Senior Performance Test Engineer
Discover the reasons for conducting various forms of performance testing and the risks you mitigate.
In m...
27/02/2024
by Kurt Neuskens, Data and Innovation Manager
In our latest #QAInsights initiative, we polled our community to discover what they wanted to know more about wh...
26/02/2024
by Maikel Geirnaert, Test Engineer
About the author Hi, my name is Maikel Geirnaert. I have 10 years of experience in testing and have gained a significant am...
22/02/2024
Learn about load, stress, spike, soak, and capacity testing to ensure your systems are ready for any workload.
by Rajinder Kumar, Senior Performance Test Engi...
22/02/2024
by Bart Grispen, Test Coordinator USB Certifications
The end is hopefully in sight for technological lock-in'. By the end of 2024, all mobile phones, tab...
26/01/2024
2024 promises to be another exciting year in a world of ever-increasing connected devices and smart home automation. As an active member of Connectivity Standar...
18/01/2024
by Leigh Taylor, Head of Cyber Defence
Most people worldwide have a mobile device (over 90%), and more than half of internet traffic comes from mobile users. T...
16/01/2024
by Rich Mort
Baking in Success - Choosing the right partner for digital transformation success In the fast-paced world of digital transformation, organisation...
19/12/2023
The growth of Connected Devices and the Internet of Things has brought with it an increased awareness of the importance of cyber security. Businesses and organi...
12/12/2023
London, UK. Resillion today announced the appointment of Yaron Kottler as Execut...
28/11/2023
The DORA or Accelerate metrics empirically show that speed (or throughput) and quality (or stability) are inseparable. The adoption of the engineering capabilit...
30/10/2023
It's just over a year (October 2022) since the Connectivity Standards Alliance (CSA) launched the Matter standard, and a certification program for products ...
12/10/2023
IoT (Internet of Things) is a technological revolution that has brought myriad benefits and positive impact to our daily lives, by connecting devices and system...
12/10/2023
by Leigh Taylor, Head of Cyber Defence
The recent collapse of KNP Logistics, one of the UK's largest privately owned logistics groups, has thrown a stark l...
04/10/2023
In today's digital landscape, where businesses rely heavily on technology to...
19/09/2023
All businesses in the Energy industry, whatever their role, increasingly rely on software systems, data networks, web applications, and automation of business p...
31/08/2023
Resillion's best in class digital film restoration team has played an integr...
29/08/2023
As of May 2023 - Eurofins Digital Testing has changed its name to Resillion UK Limited, this name change has been reflected below in the press release from 2019...
25/08/2023
The following is based on real events; names and other details have been changed...
25/08/2023
Data Protection Impact Assessment, or DPIA for short. Even the acronym can strike fear into the hearts of those struggling with data protection compliance. But ...
22/08/2023
High data rates for residential users have always been hindered by the last-mile bottleneck, i.e., low data rates on the last mile of the access network towar...
22/08/2023
Your house is on fire what do you do first? You wouldn't call your insurance company to let them know your house was ablaze whilst watching the flames furt...
07/08/2023
On July 18th, 2023, the US Government announced a cybersecurity certification and labelling program for connected devices. This US Cyber Trust Mark will allow...
31/07/2023
by Dan Martland, Technical Testing Director
As we undertake many test automati...
31/07/2023
We previously released some guidance around the new Network and Information Security Directive (NIS2), which you can read here. NIS2 has many different areas to...
25/07/2023
By Rich Mort
In a past life, some years back, I attended a sales call as a Test Consultant with a fresh faced new go gettem' salesman who was determined t...