ID 20/20: How Engler IT Stops Social Engineering and Protects Clients 24/7

  • A convincing phone call
  • A spoofed email
  • A fake identity
  • A deepfake voice
  • Stolen credentials
  • Manipulation of trust or courtesy

It’s the classic “Hi, this is Carl in accounting. I’m locked out and need a reset” scenario. In a busy office, or a growing company where people don’t know every employee personally, this can be extremely effective.

With today’s tools, attackers can:

  • Spoof phone numbers from your company
  • Clone employee voices
  • Use data from the dark web
  • Fake employee identities
  • Impersonate executives

The result? A devastating breach from a simple phone call.

This is exactly the threat ID 20/20 is built to stop.

Why Social Engineering Is a Serious Risk for IT Help Desks

If an MSP doesn’t verify identities properly, a single malicious request can lead to:

  • Unauthorized account creation
  • Stolen data
  • Deleted files
  • Ransomware attacks
  • Compliance violations
  • Complete network compromise

For example:

A terminated employee could call the IT help desk before HR notifies the IT department. If the help desk believes their story and grants access, the damage can be catastrophic – and the client will absolutely hold the MSP responsible.

At Engler IT, preventing this scenario is non-negotiable. That’s why every client we serve is protected by ID 20/20 24 hours a day, 7 days a week.

Why ID 20/20 Matters for Engler IT Clients

Engler IT manages critical, sensitive environments, many preparing for or maintaining CMMC compliance. That means we cannot rely on guesswork, trust, or familiarity when someone calls for support.

We must know exactly who we’re talking to.

ID 20/20 gives Engler IT a standardized, automated identity verification process that is fast, secure, and impossible for attackers to bypass without the proper credentials.

And unlike other MFA solutions, ID 20/20 is:

  • Easy
  • Fast
  • Non-intrusive
  • Zero-install for end users

No app required.
No complicated setup.
No frustration for employees.

Just clean, reliable, 24/7 protection.

Engler IT integrates ID 20/20 directly into our support environment to ensure that every request is legitimate before any change, reset, or access is granted.

What ID 20/20 requires:

  • A partial verbal identity check
  • A random, single-use verification code
  • Delivery to an email or phone number on record
  • Confirmation through a secure system

Because the code is generated in real time, and Engler IT has no access to the code itself, attackers cannot social engineer our technicians into giving them information or access.

ID 20/20 also integrates seamlessly with our ticketing system, automatically logging:

  • Successful verifications
  • Failed attempts
  • User cooperation
  • Process adherence

This creates a clear audit trail—a major advantage for CMMC and NIST 800-171 compliance.

1. Identity Verification Twice Over

First, Engler IT verifies the caller verbally.
Then, ID 20/20 requires a second verification with a randomly generated code sent directly to the user’s trusted device or inbox.

Without both steps, no changes are made. Period.

2. The Technician Never Sees the Code

This is crucial.
If a tech never sees the verification code, the attacker can’t manipulate them.

3. No Opportunity for Data Leakage

The system prevents technicians from inadvertently confirming or volunteering sensitive information.

4. Mandatory Logging for Compliance

Every verification attempt is logged – successful or not – ensuring:

  • Full visibility
  • CMMC audit readiness
  • Clear accountability
  • Zero gaps in process

5. It Overrides Human Error

Even the best technicians can be fooled.
ID 20/20 removes that risk entirely.

Our clients benefit from ID 20/20 protection every minute of every day, including:

  • Late-night help desk calls
  • Off-hours system access
  • Emergency password resets
  • Contractor or temp worker onboarding
  • Executive impersonation attempts
  • Fraudulent access requests

If someone tries to impersonate an employee, manager, or executive, the system stops them in seconds.

No exceptions.
No workarounds.
No special treatment.

This is a foundational layer of Engler IT’s security program – and one of the many ways we keep our clients CMMC-ready and breach-resistant.

ID 20/20 is a powerful layer of protection, but Engler IT always recommends pairing it with:

  • Employee awareness training
  • Phishing simulations
  • Strict access control policies
  • Clear verification procedures
  • A culture of “trust but verify”

CMMC demands process.
ID 20/20 enforces it – 24/7.

Recent Social Engineering losses in the news:

City of Baltimore, MD (again)

Wired over $1M to an imposter, thinking they were talking to the right person over the phone – money lost forever. Full story on our website

Comcast

Forget the ransom – Comcast paid $1.5M this month in FDC fines for not properly protecting their data before their breach happened. Full story

County of Spartanburg, SC

View this letter from the county judge that explains no answer for 27 years of estate ownership documents gone from a cyber attack. Only a sad, typewriter-composed apology.

ID 20/20 with Engler IT gives your organization:

  • Continuous verification
  • Real-time identity protection
  • Zero added burden on your employees
  • Reliable CMMC-ready process adherence
  • Automatic logging and accountability
  • 24/7 protection from impersonation and fraud

Deepfakes may be here, but they’re not getting past us.

Engler IT saw what was coming, and we built ID 20/20 into our service model to keep you protected around the clock.