A mysterious guest or unwanted visitor just walks into your company. Is this person addressed and asked who he is and what he is doing? Test it out with this formula.
With your approval we introduce ourselves as someone else, for example an employee of the electricity supplier, and try to penetrate physically as far as possible in your company. In doing so, we map all "data leaks" or security risks. This can range from confidential information lying around unattended like 'post-its' on computer screens with passwords on it or files left behind on the printer to access badges on the desks.