Phishers are inventive. Do you know how good your colleagues are at handling personalized attacks?
Your security is state-of-the-art, yet it is only just about the weakest link: end-users. How quickly do colleagues click open risky attachments or fill in sensitive data? We systematically inform and test their alertness to prevent hacks, cryptolockers, fraud or data theft.
Analyze >Numbers don't lie. We measure the extent to which colleagues fail, the sharpness of their knowledge and ability to identify rogue mails, links and apps. This way you get a better picture of the state of your company.
Train >We'll put you and your colleagues on high alert by teaching you to recognise the most diverse forms of phishing attacks and fraud, as well as raising your awareness of the enormous risks involved.
Testing >Afterwards, everyone is put to the test with fake phishing messages at unsupervised moments, sometimes weeks or months after the training. This way, you know whether the theory is applied in practice.
Managed Security Awareness’
Through regularly and unexpectedly putting your employees to the test and by continuing to raise the risks of phishing, your organisation evolves towards a safer environment.
Lay with the automated system and your colleagues on the roster and watch the trainingsYou are guaranteed to evolve into a safer environment!
How does Phishing work?
1. An attacker poses as someone known and misleads you by e-mail, phone or SMS. The intention is that you answer his question or open his forged link.
2. When you visit the forged website, either malware is downloaded automatically or an attempt is made to extract sensitive log-in data.
What types of phishing are there?
By means of impersonation an e-mail tries to impersonate a well-known brand or service in order to retrieve your log-in data.
Victims are made to think that, for example, sexually tinged webcam images of him or her have been recorded or that you know your secrets such as 'adultery' or fraud. In exchange for payment(s), they do not publish it.
Infected attachments are usually quickly filtered out. In this case you will be offered an infected download link. The file may look perfectly normal, even if it has been opened, but in the meantime you are infected.
These mails (or telephones) seem to come from important colleagues, partners or customers, aimed at decision-makers or bookkeepers hoping to execute a payment order.
10 tips to prevent phishing
You want to avoid cryptolockers, malware and data theft. Protecting both network and devices is a start and an absolute must, but there are many pitfalls that end users need to recognize and avoid, because one click can render the entire organization technically unemployed and might put sensitive data in jeopardy.
The ‘what keeps you awake’ report
Phishing, spear phishing, social engineering, ransomware… It doesn't get any easier to secure your organization if you know that your end users are the weakest link! 70% of companies without a security policy is awake from lax or ignorant end users. In this 10 page, 10TP38217;s KnowB4 whitepaper, a lot of numerical data brings out painful points that a Managed Security Awareness Training ...could occur.