Information Security Penetration Testing - Learn More
  • Services
        • SOC Assessments 

        • SOC 1
        • SOC 2
        • ISO Certifications 

        • ISO 27001
        • ISO 27701
        • ISO 22301
        • ISO 42001
        • Healthcare Assessments 

        • All Healthcare
        • HITRUST
        • HIPAA
        • Federal Assessments 

        • All Government
        • FedRAMP
        • GovRAMP
        • FISMA
        • CMMC
        • NIST 800-171
        • PCI Assessments 

        • PCI DSS
        • PCI SSF
        • Cybersecurity 

        • Penetration testing
        • Red team services
        • Ransomware preparedness assessment
        • Social engineering
        • Vulnerability assessment service
        • Privacy 

        • GDPR
        • CCPA/CPRA
        • Additional Services 

        • International Services
        • Multi-Framework
        • Microsoft SSPA
        • NIS2
        • C5
        • SOX 404
        • CSA STAR
        • Business Continuity & Disaster Recovery
        • Limited Access Death Master File
        • All Services
  • Platform
  • Company
        • About Us
        • Partners
        • Meet our team
        • Board of Directors
        • Careers
        • image

          Tampa, Fla. – 10/1/2025 – A-LIGN, a leading provider in cybersecurity compliance, has added five…

          Learn more
  • Customers
  • Resources
        • Quick links

        • Resource Center
        • Blogs
        • Case Studies 
        • Videos
        • Events
        • By service

        • SOC 2 
        • ISO 27001 
        • ISO 42001 
        • CMMC
        • FedRAMP
        • HITRUST 
        • PenTest
        • Featured Resources

          image
          image
          image
          image
  • A-SCEND Login
  • Careers
CONTACT US

Penetration Testing Case Study – Information Systems

by: A-LIGN 3 min

CybersecurityPen TestSocial Engineering

One of the best ways to test your information security posture is to simulate realistic attacks through a penetration test. Penetration testing is designed to test the information security of the technologies and systems in place at your organization, identifying vulnerabilities that can lead to a data breach or security incident. At A-LIGN, our penetration testers emulate the techniques of hackers by developing scenarios and strategies to breach your organization’s information systems, attacking your networks and applications. A-LIGN’s penetration test encompasses:

  • Network Layer Testing
  • Mobile Application Testing
  • Web Application Testing
  • Wireless Network Testing
  • Social Engineering

Case Study: Claims Adjusting Organization

As hackers become more sophisticated with their attacks, it becomes easier for them to breach a company. The Organization engaged A-LIGN to perform a penetration test to fulfill a compliance requirement and to test their security posture against realistic attacks. The Organization provides insurance companies, self-insured organizations, and government entities claim adjusting and administration services including, but not limited to:

  • Workers’ Compensation
  • Automobiles, Trucks & Motorcycles
  • General Liability
  • Medical Malpractice
  • Cost Containment, Bill Review
  • Risk Management Information Services
  • Excess Insurance Placement

A-LIGN conducted a penetration test of the Organization’s technology, people, and processes. Testing included web applications, external IP addresses, internal network components, as well as social engineering attacks. A-LIGN followed a testing methodology that seeks to identify vulnerabilities and, through exploitation, determine the impact on the Organization’s business operations.

Ultimately, A-LIGN leveraged multiple vulnerabilities to gain widespread administrative access to the environment after first gaining a foothold by manipulating users to disclose passwords.

The Penetration Test: Social Engineering Attack

The results of the penetration test indicated that the area of greatest risk for the Organization was found during social engineering attacks. The Organization’s employees were tricked into disclosing their usernames and passwords. Security awareness of employees is an important part of the overall security posture of any organization and it is often overlooked.

The A-LIGN team began the social engineering engagement by sending phishing emails to the Organization, which directed the employees to a spoofed variant and URL of the Organization’s website. The email and website requested that a user change their password and, as part of the process, provide their current username and password.

The phishing email was sent to 25 employees and successfully reached 23 inboxes. The results are shown below, indicating 11 employees clicked the link and 4 entered their credentials providing access to A-LIGN.

At this point, A-LIGN could log into users’ email accounts and search for sensitive information or connect to the internal network. The attack also provided insight into potential patterns in the employee’s creation of passwords, which could result in additional compromise.

A-LIGN’s Solution

To prevent this from happening in the future, the Organization will need to train the employees to check the URL and security of a website before entering any suspicious information into it. Employees should know how to verify the legitimacy of a website and what the Organization’s procedures are on reporting suspicious websites. They should have easy access (such as through email or a ticketing system) to contact management and/or internal information technology staff to ask questions about any website they may encounter.

As the data breach landscape escalates, organizations will need to prioritize information security by educating and training employees on security best practices, and implementing policies and procedures that will help prevent security incidents from occurring. Conducting a penetration test is a cost-effective way to analyze your organization’s infrastructure, applications, people, and processes to identify areas of weakness and the risk of a cyber threat.

A-LIGN is the leading provider of high-quality, efficient cybersecurity compliance programs. Combining experienced auditors and audit management technology, A-LIGN provides the widest breadth and depth of services including SOC 2, ISO 27001, HITRUST, FedRAMP, and PCI.

CONTACT US
  • Services
  • SOC 1
  • SOC 2
  • ISO 27001
  • ISO 42001
  • CMMC
  • HITRUST
  • FedRAMP
  • Penetration Testing
  • PCI DSS
  • HIPAA
  • International Services
  • Multi-Framework
  • All Services
  • Company 
  • About us
  • Partners
  • Platform
  • Careers
  • Our Team
  • Contact Us
  • Resources
  • Resource Center
  • Blogs
  • Case Studies
  • Videos
  • Events
  • Customers 
  • Customer Stories 
  • Resource Hubs
  • SOC 2 Resources
  • ISO 27001 Resources
  • CMMC Resources
  • ISO 42001 Resources
  • Pen Test Resources
  • Guides
  • SOC 2 Compliance
  • ISO 27001 Certification
  • CMMC Compliance
  • ISO 42001 Compliance
  • HITRUST Certification
  • ISO Certificate Directory
  • Privacy Policy
  • Cookie Policy
  • Impartiality and Inquiries
  • Acceptable Use Policy
  • Sitemap

Price and Associates CPAs, LLC dba A-LIGN ASSURANCE is a licensed certified public accounting firm registered with the Public Company Accounting Oversight Board (PCAOB). A-LIGN Compliance and Security, Inc. dba A-LIGN is a leading cybersecurity and compliance professional services firm.

A-LIGN 2025. All rights reserved.

  • Services
    • SOC Assessments
      • SOC 1
      • SOC 2
    • ISO Certifications 
      • ISO 27001
      • ISO 27701
      • ISO 22301
      • ISO 42001
    • Healthcare Assessments 
      • All Healthcare
      • HITRUST
      • HIPAA
    • Federal Assessments
      • All Government
      • FedRAMP
      • StateRAMP
      • FISMA
      • CMMC
      • NIST 800-171
    • PCI Assessments
      • PCI DSS
      • PCI SSF
    • Cybersecurity
      • Penetration testing
      • Red team services
      • Ransomware preparedness assessment
      • Social engineering
      • Vulnerability assessment service
    • Privacy
      • GDPR
      • CCPA/CPRA
    • Additional Services
      • International Services 
      • Multi-Framework 
      • Microsoft SSPA
      • NIS2
      • C5
      • SOX 404
      • CSA STAR
      • Business Continuity & Disaster Recovery
      • Limited Access Death Master File
    • All Services
  • Platform
  • Company
    • About Us
    • Partners
    • Meet our team
    • Board of Directors
    • Careers
  • Customers
  • Resources
    • Resource Center
    • Blogs
    • Case Studies 
    • Videos 
    • Events
    • By Service
      • SOC 2 
      • ISO 27001 
      • ISO 42001 
      • CMMC
      • FedRAMP
      • HITRUST
      • PenTest 
  • A-SCEND Login
  • Careers
CONTACT US