Overlay | VanRoey.be

Security Awareness

Prevent Phishing Attacks & Risk Behavior of Colleagues

End users are the weakest link in your security. Just like in a driving school, all colleagues should be informed and tested in practice to recognize dangerous situations. This phishing test is called 'Security Awareness'.

With the platform of KnowBe4:

Have access to +1,500 cyber security courses in multiple languages and tracks
Send phishing emails yourself, see who gets caught and learn from their mistake.
Discover your risk profile as a company, per department or user
You make your organization resilient to phishing, cryptolockers, data loss...

KnowBe4 Premier Partner logo

How can you prevent phishing?
With Security Awareness

You invest in firewalls, antivirus and advanced security infrastructure...but often become people forget in the protection model. Yet 40% of your employees tend to click on phishing emails!

After barely 3 months use of the KnowBe4 platform this quantity decreases by 50%. After a year you are already at -90 to 95%! This prevents errors that can lead to serious malware or data loss.

KnowBe4

The world's largest Security Awareness player and absolute market leader (Gartner, The Forrester Wave)

1. Awareness Assessment + Risk Profile

One baseline measurement by means of an internal survey shows the risk score within the organisation, per department and per individual.

Now you know who to train on whatand stronger profiles are not burdened with unnecessary training.

2. Testing and training colleagues

There are ample 1,500 training courses amidst different languages available; From Hollywood productions to bite-sized animations.  Follow on who has already followed which routes and put them to the test. Enter phishing tests from fake phishing attacks:

Managed system, simple admin portal

As an administrator you get a comprehensive portal with numerous configuration options, rich insights into training progress and evolving risk scores.

The extensive reporting tools make the platform ideally suited to ISO standards to pay. In addition, you can also Upload your own videos or training sessionsPour it into a campaign, assign scores to it and provide reporting! 

KnowBe4 Premier Partner logo

More info or free trial account?

First of all KnowBe4 Premier Partner you've come to the right place at VanRoey.be.

Also Interesting

Why is cybercrime such a lucrative business? What types of phishing and digital scams are there and how can you, as an organisation, arm yourself against them?

How does Phishing work?

1. An attacker poses as someone known and misleads you by e-mail, phone or SMS. The intention is that you answer his question or open his forged link.

2. When you visit the forged website, either malware is downloaded automatically or an attempt is made to extract sensitive log-in data.

When you go into phishing, a hacker takes over your system or account in less than 2 minutes on average.

*Source: KnowBe4

What types of phishing are there?

0 %
Credential harvesting
0 $
Potential cost Per account*

By means of impersonation an e-mail tries to impersonate a well-known brand or service in order to retrieve your log-in data.

0 %
Extortion
0 $
Potential cost Per user*

Victims are made to think that, for example, sexually tinged webcam images of him or her have been recorded or that you know your secrets such as 'adultery' or fraud. In exchange for payment(s), they do not publish it.

0 %
Malware
0 $
potential cost per organisation*

Infected attachments are usually quickly filtered out. In this case you will be offered an infected download link. The file may look perfectly normal, even if it has been opened, but in the meantime you are infected.

0 %
Spear Phishing
0 $
potential cost per organisation*

These mails (or telephones) seem to come from important colleagues, partners or customers, aimed at decision-makers or bookkeepers hoping to execute a payment order.

10 tips to prevent phishing

You want to avoid cryptolockers, malware and data theft. Protecting both network and devices is a start and an absolute must, but there are many pitfalls that end users need to recognize and avoid, because one click can render the entire organization technically unemployed and might put sensitive data in jeopardy.