Penetration Testing April 21, 2026 • By Red Obsidian Security

Social Engineering Over the Phone: Why Your Receptionist Is Your Biggest Target

The Test Starts Before Anyone Shows Up at the Door

In a well-run physical penetration test, the first phase usually does not involve anyone setting foot on your property. It happens over the phone. The engagement starts with a series of carefully crafted calls to the front desk, designed to collect specific pieces of information that will make the later on-site phase faster, quieter, and more successful.

The receptionist or front-desk attendant is the single most-targeted person in this phase. Not because they are negligent or untrained — most are neither — but because their job is to be helpful to callers, and social engineering exploits exactly that disposition.

What the Attacker Is Actually After

The phone phase of a physical assessment is not about getting passwords or wiring money. The goal is reconnaissance. Specifically:

Names and titles. Who is the IT director? Who is the facilities manager? Who works from the Sioux Falls office full-time versus remote? These names end up on the fake badges and in the name-drops at the door later.

Office routines. When does the office open? When does the cleaning crew come? When are people in meetings? When is the building mostly empty but still unlocked?

Vendor and visitor patterns. Who are your regular delivery contacts? What printing company services the copiers? Which HVAC company handles maintenance? Impersonating a known vendor is one of the highest-success entry strategies.

Physical layout. Is the server room on the main floor? Is there a back entrance? Where do employees park? A casual question buried in an otherwise innocuous call ("oh, I was going to drop something off after hours, is the north door staffed?") pulls useful geography.

The Scripts You Will Hear

Most phone social engineering follows a handful of reliable patterns. Once you know them, they become obvious. Your front desk should know them too.

The confused delivery driver. "Hi, I have a package for Jennifer in accounting but the address label is smudged — is your office on the second floor or third?" Extracts floor layout and confirms a name.

The audit firm. "This is Mike from [your auditor's name] — I am trying to reach the IT manager about our annual walkthrough next month." Extracts the IT manager's name and ideally their direct line.

The fellow employee from a different office. "Hey, this is Sarah from the corporate office — who should I talk to about getting a badge made for a vendor coming in next week?" Extracts the facilities or security contact and implies familiarity with the internal structure.

The survey. "We are doing an industry benchmark on office security practices, quick five-minute call — do you use keycard access? About how many employees? What is your office hours?" Direct reconnaissance dressed up as marketing.

The urgent vendor. "This is [HVAC company] — we got a call about the system making a noise, can you tell me when the next time someone will be on-site is so we can schedule?" Extracts the after-hours schedule.

What Training Actually Changes

Training a front desk on social engineering is not about making them paranoid. It is about giving them a few specific tools that let them stay helpful without giving up anything valuable.

First — a callback policy. Anyone asking for personnel names, schedules, or facility details by phone gets "let me take your number and have the right person call you back." Legitimate callers do not mind. Attackers hang up.

Second — internal verification. If someone calls claiming to be from "the corporate office," the receptionist has the corporate directory and calls them back at the number on file, not the one the caller offered.

Third — a named contact for vendor inquiries. No vendor information — not even "we use Company X for printing" — gets confirmed over the phone without internal check. If that seems extreme, remember: the reason the caller wants to know what your printing vendor is named is to walk through the door in a polo shirt with that company's logo on it.

Test It Before Someone Else Does

Most of what we find in the phone phase of a physical assessment is fixable with an hour of training and a two-paragraph addition to the front-desk playbook. The gap is not skill — it is awareness that the test is happening. Once the receptionist knows what the calls sound like, the success rate drops dramatically.

Red Obsidian Security conducts physical penetration testing that includes phone-based reconnaissance as a standard part of the engagement. The post-assessment deliverable includes every call made, what was collected, and specific training recommendations for the front-desk team. Call (605) 223-8100.

← Previous What to Look For in a Mobile Patrol Report Next → Writing an Emergency Plan Your Night Staff Will Actually Use

Ready to Secure
What Matters?

Whether you need round-the-clock guards, emergency lockout help, or a complete security overhaul — Red Obsidian is ready to deploy.