Skip to content
Raxis
  • Home
  • Services
      Red Team Penetration Testing
    • Red Team
    • Breach and Attack Simulation
    • Phishing and Spear Phishing
    • Physical Penetration Testing
    • Penetration Testing
    • Penetration Testing Services
    • Raxis Attack: PTaaS
    • Raxis Strike: Penetration Test
    • Web Application Penetration Testing
    • API Security
    • Salesforce Applications
    • Internal Networks, Cloud, and VPC
    • External Networks and Internet
    • Wireless Networks
    • Mobile Applications
    • Cybersecurity Services
    • Elite Cybersecurity Services
    • Attack Surface Management
    • Cybersecurity Code Review
  • Industries
      Critical Infrastructure
    • Energy
    • Communications
    • Transportation
    • Water
    • Compliance Driven
    • Credit Card Industry (PCI)
    • Healthcare (HIPAA, FDA)
    • SOC 2
    • Education
    • Finance and Banking
    • GLBA Safeguards Rule
    • Government Agencies
    • Manufacturing
    • Technology
    • Technology and Software Development
    • Blockchain and Cryptocurrency
    • Media and Entertainment
    • Social Media
  • Resources
      Company Information
    • About Raxis
    • Become a Raxis Partner
    • Careers
    • Certifications
    • Meet Our Team
    • Signup for Raxis News
    • Resources
    • The Exploit Blog
    • Raxis One
    • Red, Blue, and Purple Teams
    • Penetration Test Glossary
    • Transporter Remote Pentesting
    • What is a Penetration Test?
  • The Exploit Blog
  • About Us
Contact Raxis Login
Raxis
Contact RaxisIcon Link to Contact Raxis
  • Home
  • Services
      Red Team Penetration Testing
    • Red Team
    • Breach and Attack Simulation
    • Phishing and Spear Phishing
    • Physical Penetration Testing
    • Penetration Testing
    • Penetration Testing Services
    • Raxis Attack: PTaaS
    • Raxis Strike: Penetration Test
    • Web Application Penetration Testing
    • API Security
    • Salesforce Applications
    • Internal Networks, Cloud, and VPC
    • External Networks and Internet
    • Wireless Networks
    • Mobile Applications
    • Cybersecurity Services
    • Elite Cybersecurity Services
    • Attack Surface Management
    • Cybersecurity Code Review
  • Industries
      Critical Infrastructure
    • Energy
    • Communications
    • Transportation
    • Water
    • Compliance Driven
    • Credit Card Industry (PCI)
    • Healthcare (HIPAA, FDA)
    • SOC 2
    • Education
    • Finance and Banking
    • GLBA Safeguards Rule
    • Government Agencies
    • Manufacturing
    • Technology
    • Technology and Software Development
    • Blockchain and Cryptocurrency
    • Media and Entertainment
    • Social Media
  • Resources
      Company Information
    • About Raxis
    • Become a Raxis Partner
    • Careers
    • Certifications
    • Meet Our Team
    • Signup for Raxis News
    • Resources
    • The Exploit Blog
    • Raxis One
    • Red, Blue, and Purple Teams
    • Penetration Test Glossary
    • Transporter Remote Pentesting
    • What is a Penetration Test?
  • The Exploit Blog
  • About Us

Cybersecurity Insights From The Frontlines

  • Raxis presenting at (ISC)² Atlanta Chapter Meeting
    In The News | Raxis In The Community | Social Engineering

    Raxis Presents at the (ISC)² Atlanta Chapter Meeting

    ByBrad Herring July 29, 2019

    Raxis was honored to present at the (ISC)² Atlanta Chapter Meeting last Thursday. The topic was Social Engineering and understanding how the high success rates of social engineering impacts network security.

    Read More Raxis Presents at the (ISC)² Atlanta Chapter MeetingContinue

  • Tailgating & Other Physical SE - SOCIAL ENGINEERING [PART 3]
    Social Engineering

    Tailgating & Other Physical SE – SOCIAL ENGINEERING [PART 3]

    ByBonnie Smyre April 11, 2018January 17, 2025

    Raxis COO Bonnie Smyre discusses physical social engineering, which tests to see how your employees and systems react when someone who should not be allowed access attempts to get past your controls to gain access to your sensitive information and networks.

    Read More Tailgating & Other Physical SE – SOCIAL ENGINEERING [PART 3]Continue

  • Physical Security Pitfalls
    Social Engineering

    Physical Security Pitfalls: What our physical assessments show us

    ByBrian Tant April 19, 2017July 28, 2025

    Effective infosec programs are built upon strong physical security. Once an attacker gains physical access, chances of a data breach become much higher.

    Read More Physical Security Pitfalls: What our physical assessments show usContinue

  • Person looking at 0s and 1s
    Phishing | Social Engineering | Tips For Everyone

    The Human Element is Often the Weakest Link

    ByBrad Herring August 31, 2016

    Raxis VP of Business Development Brad Herring discusses social engineering and how many hackers take the easy path & trick employees into giving them access.

    Read More The Human Element is Often the Weakest LinkContinue

2870 Peachtree Road
Suite #915-8924
Atlanta, GA 30305 USA

+1 678.421.4544

Contact us online for faster response

About Raxis

  • About Raxis
  • Careers
  • Terms and Conditions
  • Privacy Policy
  • Penetration Testing Partner Program

Resources

  • The Exploit Blog
  • Transporter Remote Penetration Testing
  • Penetration Test Glossary
  • What is a Penetration Test?
Facebook X Instagram Linkedin YouTube