1. Schedule a 30-minute Discovery Session
2. We determine IF and HOW we can help
3. We provide a Tailored Proposal
4. Together, we review the Proposal
We provide a list of all user email addresses we are able to discover on the Internet using our OSINT methods. Alternatively, we are happy to test a targeted group of users, based on information you provide to us.
With your permission, we test these email addresses, as well as explicit email addresses, as provided. We use at least two (2) different email messages/tactics against your users. We measure how many users fall for the phishing ploy – click on a link, divulge information, or open an attachment. We determine constraints of the phishing campaign, such as what types of information (usernames, passwords, etc.) we can gather, during the Rules of Engagement process.
Our Phishing Exercise testing services provides an economic way for you to measure the effectiveness of your Security Awareness training. Many attackers use social engineering tactics to take control of your systems. People, processes, and technologies have to work in concert to achieve a secure environment. Our Phishing Campaigns test the people part of this triad.
The Phishing Exercise Report covers tactics used for the phishing campaign and analytics will be provided for the email campaign that show how many users “fell” for the tactic used by clicking on a link or opening an attachment. Samples of phishing emails will be included in this section of the report.
The number of cybersecurity incidents continues to climb. The variety of attacks continues to grow. It is no longer a question of if you will have a cyber event.