It will test how your employees would react to a real attack.
The goal of a simulated phishing attack is to test your employees’ reaction to a situation where an attacker tries to extort sensitive data from your company – most often user passwords.
For the attacker, this type of attack is simple and usually successful. With the access credentials obtained, the attacker can gain access to the company’s internal network, e.g. via a VPN, or to internal applications and their data. Due to the popularity of Single-Sign-On solutions, this allows an attacker to access a wide range of applications and data.
Email – We use email messages to persuade your users to send sensitive information, such as usernames and passwords, or to click on a potentially dangerous link.
Telephone – We contact the user by telephone and use pre-prepared scenarios to test whether the user succumbs to pressure and reveals some sensitive information.
1. Analysis
2. Preparing
3. Action
4. Progress
5. Conclusion
After completing the password, the user may be presented with an educational page that contains information on what the user should and should not do.
It is advisable to educate the user on a regular basis. For this purpose, we recommend deploying Proofpoint to provide regular education for your users in the form of e-learning courses, combined with phishing attack simulations. Based on the simulated attacks, you can see where individual users are going wrong and create an individual learning plan for them.
In addition to regular user education, two-factor authentication can also partially prevent a real attack. If an attacker obtains a user’s password, they will need a second factor – such as code from an authentication application – to access the application/internal network.
However, if the attacker forces the user to execute malicious code on their PC – e.g. by opening an attachment, downloading and running the attacker’s program, then even this protection will not help.
If you are interested in our services or have any questions, please do not hesitate to contact us using the contact form or we will be happy to meet you at our offices in Prague, Brno and Bratislava.
David Pícha
Cyber Security BDM
+420 604 200 062
david.picha[@]integra.cz
U Sluncové 666/12a
186 00, Praha 8
Czech Republic
IČO: 24216941 / DIČ: CZ24216941