https://store-images.s-microsoft.com/image/apps.51302.7ad35e99-8401-49a4-9a7a-f799b7912901.dd17055b-018e-4c94-b86f-9fe02327178b.de5d782d-c925-468d-b1bd-f6edfc2684a4

Phishing Attack Simulator: 2-Month Assessment

Integrity Partners Sp. z o.o.

An anti-phishing training with the use of Attack Simulator (part of the Office 365 ATP Plan 2) is an offer to perform an interactive training session for your company.

An anti-phishing training with the use of Attack Simulator (part of the Office 365 ATP Plan 2) is an offer to perform an interactive training session for your company. Depending on the scale, we prepare a longterm phishing campaign to assess the vulnerability of your team, up to 1000 end users. A minimum timeframe to deliver proper results equals 2 months. A desired outcome is to build cybersecurity awareness among employees, develop good practice – and develop more sophisticated anti-threat policies.

The basic variant of our service is a 5 day campaign, consisting:
1.Preparing a list of end users to be subject to the campaign – divided into separate groups up to 100 recipients (customer prepares a .csv file with the complete e-mail list)
2.Building a custom landing page and an educational video recording, covering
  a.What “phishing” really is?
  b.How to avoid the phishing attempts?
  c.Best practice recommendations
3.Designing 15 email templates (both internal and external) to be sent out to your recipients. Each recipient will receive 9 crafted messages in the course of 3 month campaign
4.Suggested e-mail templates include a rating of:
  a.Vulnerability for malicious attachments – internal e-mail from the HR dept, IT dept, Board of Directors, EHS and Administration
  b.Vulnerability for malicious attachments – external e-mail with a hotel booking / invoice, office administration, tickets for an external evants, webinar invitation
  c.Identity theft vulnerability – internal e-mail with a OneDrive link, ticketing system, vacation tracking system, etc.
  d.Identity theft vulnerability – external e-mail, imitating a LinkedIn notification, e-commerce notification
5.A summary report with the general vulnerability assessment
  a.Trends, according to the campaign type
  b.Detailed statistics matched with the end-users
  c.Recommendations, suggested solutions.

Súhrnný prehľad

https://store-images.s-microsoft.com/image/apps.50582.7ad35e99-8401-49a4-9a7a-f799b7912901.dd17055b-018e-4c94-b86f-9fe02327178b.81ce6141-1381-4e8c-aea3-1e0306651849