Managed services
Our fully managed service is conducted by our expert team.
Everything is created, ran, chased and reported on for you. All you need to do is provide us a list of your users and add our sending IP’s to your email security. We will target your organisation as would a hacker, identify your weaknesses and ensure your staff are trained to combat such attacks.
A managed service saves your time and resources. Our professional security team constantly keep up with the latest threats and tactics used by your potential adversaries. They will efficiently target your staff and key personnel with relevant, realistic attacks ensuring your most vulnerable users become valuable assets in the defence against email based threats.
-
Step 1
Research & Threat Analysis
We research your organisation and produce a complete Phishing Threat Analysis report. This report will highlight any vulnerabilities and ensure that your organisation is adhering to Email Security Best Practices. Invoice Fraud, Business Email Compromise and many other email based attacks can originate outside of your organisation. We will report on key business partners (up to 10 domains) to ensure that third party vendors are not introducing vulnerabilities into your eco-sphere.
-
Step 2
Preparation
Based on our Threat Analysis and with reference to the online services, clients and providers specific to your organisation we plan a bespoke Phishing Security Exercise. We register typo domains to use for the later stages of the exercise and to more immediately target your high value personnel at risk of CEO Fraud and Invoice Scam email-based attacks.
-
Step 3
Execution
All employees receive the first phishing email. Regular targeted phishing emails (one per user per month and randomised) are sent to all employees. The targeted emails work to ensure staff stay vigilant and apply the training skills on a day to day basis. Anyone who is still a security risk to your business is provided the additional, in-depth training they need to protect your organisation.
-
Step 4
Reinforcement
Employees receive regular targeted phishing emails as part of an ongoing process – usually one a month. Behavioural changes that improve an organisations security profile and reduce the likelihood of a successful cyber-attack are directly related to frequency of Phishing Simulations.
-
Step 5
High Value Targets
Throughout the year we will target key employees (high value targets) with specific BEC and CEO fraud attacks to ensure they remain vigilant and are well equipped to defend themselves from such attacks.