Did you reach this page by following a link in an e-mail?
If this e-mail had been a phishing attempt, cyber criminals may have already led you to fraudulent or harmful websites. Thankfully, in this instance, it led you to this page about Blue Rock’s simulated phishing services.
It’s a new ethical hacking and cyber awareness solution from our Blue Rock Cyber Defence business that reveals how prone your business is to phishing attacks and aims to educate your employees so that they become active participants in your cyber defence strategy.
Phishing is the process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity, using bulk email which tries to evade spam filters.
E-mails claiming to be from social web sites, banks, auction sites or IT administrators are commonly used to lure unsuspecting users.
It’s a form of criminally fraudulent social engineering.
Let’s phish your users to find out how vulnerable your business is to attacks
Blue Rock can use a wide variety of phishing techniques to test your users. This will tell you if people click on hyperlinks, open attachments or reply to phishing e-mails. They will then use this data to reveal how prone your organisation is to such attacks.
Tests are scheduled at a frequency which is right for your organisation. Random phishing e-mails are sent to different users and the time those e-mails are sent is also randomised, so that means you won’t have users warning each other that a test is taking place.
Here’s how it works
- We choose a phishing test which best suits your business circumstances
- We choose a landing page your users will see if they click on any links
- We show users which red flags they missed
- We provide a report, which reveals how prone your business is to phishing attacks
By putting your users through continual security awareness training like this, they become an active part of your overall cyber defence strategy. Phishing e-mails no longer get the innocent interaction from users that cyber crooks need. Instead, your users end up with a changed mindset that causes them to be suspicious of even the smallest out of place detail. The end result is phishing becomes less effective as an attack vector.
Talk to us to find out more.
Complete the reply form below and someone will be in touch to help you start the “phight back” against phishing attacks…