falanx Cyber Falanx Phishing: Measure your resilience

Similar documents
falanx Cyber Falanx Cyber Awareness Training: Educating your staff

CYBER RESILIENCE & INCIDENT RESPONSE

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

Information Security Controls Policy

Today s Security Threats: Emerging Issues Keeping CFOs Up at Night Understanding & Protecting Against Information Security Breaches

Security Awareness Training Courses

OA Cyber Security Plan FY 2018 (Abridged)

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

Defensible and Beyond

Panda Security 2010 Page 1

Make your people your most effective defence against cyber-attacks. Brought to you in partnership with

Risk Outlook Anti money Laundering and Cybercrime. Steve Wilmott and George Hawkins

CYBER SECURITY TAILORED FOR BUSINESS SUCCESS

Cyber Security. Building and assuring defence in depth

Mission: Continuity BUILDING RESILIENCE AGAINST UNPLANNED SERVICE INTERRUPTIONS

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.

BRING SPEAR PHISHING PROTECTION TO THE MASSES

This Online Gaming Company Didn t Want to Roll the Dice on Security That s Why it Worked with BlackBerry

DHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1

Cyber security tips and self-assessment for business

DIGITAL ACCOUNTANCY FORUM CYBER SESSION. Sheila Pancholi Partner, Technology Risk Assurance

Cyber Security Stress Test SUMMARY REPORT

Service Provider View of Cyber Security. July 2017

Ransomware A case study of the impact, recovery and remediation events

KnowBe4 is the world s largest integrated platform for awareness training combined with simulated phishing attacks.

RANSOMWARE PROTECTION. A Best Practices Approach to Securing Your Enterprise

The Credential Phishing Handbook. Why It Still Works and 4 Steps to Prevent It

falanx Cyber ISO 27001: How and why your organisation should get certified

Cyber Attack: Is Your Business at Risk?

COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE. Presented by Paul R. Hales, J.D. May 8, 2017

Cybersecurity The Evolving Landscape

Evolution of Spear Phishing. White Paper

RSA INCIDENT RESPONSE SERVICES

Train employees to avoid inadvertent cyber security breaches

Security & Phishing

How Breaches Really Happen

The University of Queensland

Evolution of a Phish That Got Through the Net[work]

with Advanced Protection

Understanding the Changing Cybersecurity Problem

EMPLOYEE SKILLS TRAINING PLATFORM. On-access skills training and measurement for all employees

A practical guide to IT security

Cyber Risk in the Marine Transportation System

Presented by Ingrid Fredeen and Pamela Passman. Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0

RSA INCIDENT RESPONSE SERVICES

Managed Enterprise Phishing Protection. Comprehensive protection delivered 24/7 by anti-phishing experts

Are we breached? Deloitte's Cyber Threat Hunting

2017 Annual Meeting of Members and Board of Directors Meeting

CYBER SOLUTIONS & THREAT INTELLIGENCE

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION

How Cyber-Criminals Steal and Profit from your Data

Recognizing & Protecting Against Fraud

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

New Zealand National Cyber Security Centre Incident Summary

CYBER SECURITY RISK ASSESSMENT: WHAT EVERY PENSION GOVERNMENTAL ENTITY NEEDS TO KNOW

Digital Health Cyber Security Centre

ADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY

Cyber Security Trends A quick guide

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

Cyber Accelerate. Fast-track to cyber security for SMEs. KPMG New Zealand. kpmg.com/nz/cyber

Awareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB

Department of Management Services REQUEST FOR INFORMATION

PEOPLE CENTRIC SECURITY THE NEW

Information Security Controls Policy

The UK s National Cyber Security Strategy

Incident Response. Tony Drewitt Head of Consultancy IT Governance Ltd

Security. Protect your business from security threats with Pearl Technology. The Connection That Matters Most

State of the Phish 2016

Building a Resilient Security Posture for Effective Breach Prevention

A CFO s Guide to Cyber Security in the Coming Year

Cybersecurity. Overview. Define Cyber Security Importance of Cyber Security 2017 Cyber Trends Top 10 Cyber Security Controls

Five network. security. threats. and how to fight them

Industry 4.0 = Security 4.0?

Protecting from Attack in Office 365

Business continuity management and cyber resiliency

Cyber Resilience - Protecting your Business 1

Ransomware A case study of the impact, recovery and remediation events

BUSINESS LECTURE TWO. Dr Henry Pearson. Cyber Security and Privacy - Threats and Opportunities.

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

Without us, your world could suddenly find itself turned upside down.

Kaspersky Enterprise Cybersecurity. Employee Skills Training Platform. #truecybersecurity

Phishing: What is it and how does it affect me?

Cyber Security Risk Management and Identity Theft

CYBER SECURITY TRAINING

IT Security Update on Practical Risk Mitigation Strategies

10 Cybersecurity Questions for Bank CEOs and the Board of Directors

Cyber Crime and Online Payment Fraud Trends

Cyber and data security How prepared is your charity?

Incident Response Table Tops

What can we lose not implementing proper security in our IT environment? Aleksandar Pavlovic Security Account Manager Cisco

Employee Privacy in the Electronic Workplace

T-SURE VIGILANCE CYBER SECURITY OPERATIONS CENTRE

Cyber Security and Data Protection: Huge Penalties, Nowhere to Hide

Employee Security Awareness Training

ANATOMY OF AN ATTACK!

Methods for Reducing Cybersecurity Vulnerabilities of Power Substations Using Multi-Vendor Smart Devices in a Smart Grid Environment

June 2 nd, 2016 Security Awareness

Cyber fraud and its impact on the NHS: How organisations can manage the risk

The hidden cost of smart buildings

Transcription:

falanx Cyber Falanx Email Phishing: Measure your resilience

Contents What is Email Phishing? 3 Why should I carry out an Email Phishing exercise? 4 PhishEd Managed regular phishing 5 Single assessments 6 Why choose Falanx Email Phishing? 7 About us Falanx Cyber deliver a complete end-to-end managed service that brings all of our services you for a single monthly fee. We combine traditional cyber security services such Penetration Testing, Consulting and Incident Response with our cutting edge managed service, MidGARD, to provide complete end to end coverage for your business. Acquired in 2018 by Falanx group, First Base Technologies is a leading cyber security testing, consulting and training services provider with three decades of experience. Providing services such as Threat and Risk Analysis (TARA) and Red Teaming, we help to defend your organisation in this ever-changing threat landscape.

What is Email Phishing? Email phishing is the most common tactic used by hackers to breach your defences and gain access to your network. The email will include a link or attachment and provide a compelling reason why the victim should open it. Once opened, the hacker will have control of the computer and can then take control of other computers on the network, with the aim of stealing sensitive information or encrypting the data and demanding a ransom payment to release it. Falanx offer two types of email phishing tests to assess your organisation s resilience to this type of attack: our managed phishing service for regular testing, PhishEd, or one-off assessments used to gauge your awareness at a single point in time. 3

Why should I carry out an Email Phishing exercise? An email phishing test assesses staff awareness to common phishing techniques used by hackers. Despite the increasing sophistication of email defence software, inevitably, a small number of emails will still reach the inbox of your staff. How those staff members react to that email can define whether a data breach occurs. Our services will educate staff on the common techniques that hackers use, teaching them the tell-tale signs that may indicate an email is not genuine. By regularly training staff to recognise the techniques hackers are using at that moment, you can make them your most important line of defence. 4

PhishEd Managed regular phishing. PhishEd is a fully-managed phishing service designed for regular testing of staff awareness. You provide us with a distribution list for each attack and we will design the email template using a variety of different scenarios. The email is then sent to everyone on the distribution list. Any employees that interact with the email can be taken to a customisable training page that shows advice on how to avoid similar attacks in the future. We can even embed our own video-based training into the page. We track all interactions with the phishing campaign: who clicked, who entered a password, the quality of that password, and any other relevant metrics. We then measure the improvement in response rates to each campaign, demonstrating the ROI of the testing and the tangible increase in resilience to phishing attacks. 5

Typical scenarios we can run include: Credential harvesting (e.g. fake email from the IT department tricking users into logging into a fake version of Outlook) Simulated ransomware attacks Business email compromise/ceo Fraud attacks targeting finance staff Simulated malware attacks Highly-targeted spear phishing Each of these scenarios is highly customisable, for example, simulating internal emails using your email signature. PhishEd is a perfect addition to our managed security awareness program. This combines the results of the phishing tests into face-to-face awareness sessions for all staff, delivered by the people that designed and executed the attacks. Rather than showing staff generic email phishing examples, we can demonstrate the attacks that your staff fell victim to, and how they can prevent it in the future. We teach the psychology of how phishing attacks try and trigger an emotional response in you - be it curiosity, fear or anger - and the simple techniques that can be used to recognise an attack. Single assessments Falanx can deliver one-off phishing attacks if you would like to measure your staff awareness at a single point in time. Any of the scenarios described in the PhishEd service can be delivered, tracking the same metrics of interaction with the email. A report is then produced describing the scenario, the results, and the risk to the business, were the attack to have been conducted by a real criminal group. 6

Why choose Falanx Email Phishing? Up to date: Our phishing attacks reflect the techniques hackers are using right now. Our team are constantly researching the latest trends and will build our attacks based on the real-world threat at this time. Measure improvement: Our PhishEd service will improve staff awareness, increase reporting rates of phishing attacks, and make you less susceptible to real phishing attacks that might cause a data breach. Fully Customisable: If there is a particular scenario you would like to test, we can create it for you. Culture Change: Combined with our highlycustomised training programme, use the results of the email phishing exercises to drive an increase in awareness throughout the business, starting with the board and cascading the training down. Increase awareness: We will show how the attack was constructed and combine it with general cyber security awareness training to provide a powerful message that can dramatically increase security. 7

Interested in finding out more about what Falanx s Email Phishing services can do for your organisation? Get in touch at info@falanx.com or call +44 (0) 20 7856 9450 Part of the Falanx group falanx Cyber falanx Technologies www.falanx.com