Information Security Penetration Testing - Learn More
  • Services
    • Links
      • SOC ASSESSMENTS
        • SOC 1
        • SOC 2
      • ISO CERTIFICATIONS
        • ISO 27001
        • ISO 27701
        • ISO 22301
        • ISO 42001
      • HEALTHCARE ASSESSMENTS
        • All Healthcare
        • HITRUST
        • HIPAA
      • Federal Assessments
        • All Government
        • FedRAMP
        • StateRAMP
        • FISMA
        • CMMC
        • NIST 800-171
      • PCI Assessments
        • PCI DSS
        • PCI SSF
      • Cybersecurity
        • Penetration testing
        • Red team services
        • Ransomware preparedness assessment
        • Social engineering
        • Vulnerability assessment service
      • Privacy
        • GDPR
        • CCPA/CPRA
      • International Services
      • Additional Services
        • Microsoft SSPA
        • NIS2 Directive
        • C5 Attestation
        • SOX 404
        • CSA STAR
        • Business Continuity & Disaster Recovery
        • Limited Access Death Master File
    • FEATURED RESOURCES
      • What is SOC 2? Complete Guide to SOC 2 Reports and Compliance

        SOC 2

        Menlo Security reduces evidence collection time by 60% with consolidated audit approach 

        ISO 27001SOC 2

        ISO 42001 Checklist – Prepare for AI Compliance 

        ISO 42001

        CMMC Buyer’s Guide: How To Choose a C3PAO

        CMMC
  • Technology
  • About Us
    • Our Company
    • Meet our team
    • Board of Directors
    • Partners
    • Events
    • Careers
  • Resources
  • A-SCEND Login
  • Careers
CONTACT US

Penetration Testing Case Study – Information Systems

by: William Prater 3 min

CybersecurityPen TestSocial Engineering

One of the best ways to test your information security posture is to simulate realistic attacks through a penetration test. Penetration testing is designed to test the information security of the technologies and systems in place at your organization, identifying vulnerabilities that can lead to a data breach or security incident. At A-LIGN, our penetration testers emulate the techniques of hackers by developing scenarios and strategies to breach your organization’s information systems, attacking your networks and applications. A-LIGN’s penetration test encompasses:

  • Network Layer Testing
  • Mobile Application Testing
  • Web Application Testing
  • Wireless Network Testing
  • Social Engineering

Case Study: Claims Adjusting Organization

As hackers become more sophisticated with their attacks, it becomes easier for them to breach a company. The Organization engaged A-LIGN to perform a penetration test to fulfill a compliance requirement and to test their security posture against realistic attacks. The Organization provides insurance companies, self-insured organizations, and government entities claim adjusting and administration services including, but not limited to:

  • Workers’ Compensation
  • Automobiles, Trucks & Motorcycles
  • General Liability
  • Medical Malpractice
  • Cost Containment, Bill Review
  • Risk Management Information Services
  • Excess Insurance Placement

A-LIGN conducted a penetration test of the Organization’s technology, people, and processes. Testing included web applications, external IP addresses, internal network components, as well as social engineering attacks. A-LIGN followed a testing methodology that seeks to identify vulnerabilities and, through exploitation, determine the impact on the Organization’s business operations.

Ultimately, A-LIGN leveraged multiple vulnerabilities to gain widespread administrative access to the environment after first gaining a foothold by manipulating users to disclose passwords.

The Penetration Test: Social Engineering Attack

The results of the penetration test indicated that the area of greatest risk for the Organization was found during social engineering attacks. The Organization’s employees were tricked into disclosing their usernames and passwords. Security awareness of employees is an important part of the overall security posture of any organization and it is often overlooked.

The A-LIGN team began the social engineering engagement by sending phishing emails to the Organization, which directed the employees to a spoofed variant and URL of the Organization’s website. The email and website requested that a user change their password and, as part of the process, provide their current username and password.

The phishing email was sent to 25 employees and successfully reached 23 inboxes. The results are shown below, indicating 11 employees clicked the link and 4 entered their credentials providing access to A-LIGN.

At this point, A-LIGN could log into users’ email accounts and search for sensitive information or connect to the internal network. The attack also provided insight into potential patterns in the employee’s creation of passwords, which could result in additional compromise.

A-LIGN’s Solution

To prevent this from happening in the future, the Organization will need to train the employees to check the URL and security of a website before entering any suspicious information into it. Employees should know how to verify the legitimacy of a website and what the Organization’s procedures are on reporting suspicious websites. They should have easy access (such as through email or a ticketing system) to contact management and/or internal information technology staff to ask questions about any website they may encounter.

As the data breach landscape escalates, organizations will need to prioritize information security by educating and training employees on security best practices, and implementing policies and procedures that will help prevent security incidents from occurring. Conducting a penetration test is a cost-effective way to analyze your organization’s infrastructure, applications, people, and processes to identify areas of weakness and the risk of a cyber threat.

  • Services
  • Software
  • About us
  • Partners
  • Careers
  • ISO Certificate Directory
  • Privacy Policy
  • Cookie Policy
  • Impartiality and Inquiries
  • Acceptable Use Policy
  • Sitemap
CONTACT US

Price and Associates CPAs, LLC dba A-LIGN ASSURANCE is a licensed certified public accounting firm registered with the Public Company Accounting Oversight Board (PCAOB). A-LIGN Compliance and Security, Inc. dba A-LIGN is a leading cybersecurity and compliance professional services firm.

A-LIGN 2025. All rights reserved.

  • Services
    • SOC ASSESSMENTS
      • SOC 1
      • SOC 2
    • ISO CERTIFICATIONS
      • ISO 27001
      • ISO 27701
      • ISO 22301
      • ISO 42001
    • HEALTHCARE ASSESSMENTS
      • All Healthcare
      • HITRUST
      • HIPAA
    • Federal Assessments
      • All Government
      • FedRAMP
      • StateRAMP
      • FISMA
      • CMMC
      • NIST 800-171
    • PCI Assessments
      • PCI DSS
      • PCI SSF
    • Cybersecurity
      • Penetration testing
      • Red team services
      • Ransomware preparedness assessment
      • Social engineering
      • Vulnerability assessment service
    • Privacy
      • GDPR
      • CCPA/CPRA
    • Additional Services
      • Microsoft SSPA
      • NIS2 Directive
      • C5 Attestation
      • SOX 404
      • CSA STAR
      • Business Continuity & Disaster Recovery
      • Limited Access Death Master File
  • Technology
  • About Us
    • Our Company
    • Meet our team
    • Board of Directors
    • Partners
    • Events
    • Careers
  • Resources
  • A-SCEND Login
  • Careers
CONTACT US