of your business’s security and therefore an attractive
target for would be attackers. Our tailored phishing
simulation assessments can deliver a deeper insight into
how your personnel may react to a social engineering
attack and the extent to which an attacker can extort
information and cause damage to your business.
What is Phishing?
Phishing is a social engineering attack. It uses deception to manipulate individuals into divulging information that they should not have access to. Phishing is a common category of attack due to it’s low technical barrier to entry and is typically initiated on a large scale. A successful social engineering attack can lead to disclosure of sensitive data and details that can help attackers execute a more sophisticated attack upon your business.
Running a phishing simulation can help you better understand how prepared your business is to withstand this form of attack. It will also help to highlight any training gaps that need to be addressed. A phishing simulation will also help to raise the profile of cyber security within your business and help all personnel to better understand the important role they play in keeping the business secure.
What Does it Involve?
Our phishing simulations are specifically tailored to your needs. At the most basically level we will attempt to see the extent to which your personnel engage with the payload mechanism (i.e. a malicious web link) and provide metrics that will help to assess staff awareness and the effectiveness of training programs.
Our phishing simulation reporting is structured in a way that makes the results and key takeaways easily memorable. For example, we can segment the results by team and benchmark your business against the wider industry.
Assessments undertaken by CREST Registered Penetration Testers.
Clear & Focused
Findings reported in plain English and prioritised to help you focus on what really matters.
Competitive quotes tailored to your business with no hidden costs.
Complimentary remediation support and retesting to validate the effectiveness of any changes made.
LLMNR/NBT-NS Poisoning on Windows Domain Environments
Predatech offers a range of security testing services and products, from vulnerability assessments to penetration testing.