Service composition

  • Connecting to the service
  • User training and testing with various traps and templates used in real attacks on the following topics:
    • Secure Internet and Email,
    • Physical Security,
    • Mobile Security
  • Program interface for managing and viewing the service's statistics

Goals and values

  • Reducing the risks of leaks, destruction and corruption of confidential information and other negative effects of attacks
  • Checking the level of current user awareness through controlled phishing penetration testing and identifying risk groups
  • Increasing employee knowledge of cyber security issues and the importance of existing cyber security measures
  • Creation of unique templates for phishing attacks
  • Creation of stub pages to notify staff when a check fails
  • Creation of customized attack schedules for dedicated user groups
  • Creation of physical digital media with attack file (on request)
  • Cyber security courses customized for basic awareness levels
  • Ability to create courses for internal needs and to familiarize employees with company regulations
  • Flexible customization of the job scheduler for automatic training of new and existing users
  • Course and test package constantly updated with new scenarios, designed for different focus groups
  • Distribution of courses by groups and awareness level (on request)

Algorithm for connection

1

Filling out the application

2

Coordination of requirements and staff email list connected to the platform

3

Selection of controlled attack scenarios, coordination, launching and testing of users

4

Checking the attack results and sending the employees for training, notifying the responsible persons

5

Testing at the end of training

Try it out

Let’s talk about how to improve the security and efficiency of your IT and cyber security systems