CyanLine has the capability of performing an authorized phishing simulation against to train employees. An effective phishing campaign when done properly can make the difference in your employee who clicks on malicious links and opens attachments that will harm your organization.
Real time phishing simulations have proven to double employee awareness retention rates versus other cyber security training tactics such as classroom lecture.
What Is A Phishing Test Exactly?
A phishing test is often used by security and IT professionals to create a mock scenario that consists of emails and or web pages that are sent to your employers. These fake attacks simulate real life engagements that have not only been seen in the wild before, but also replicate the methods in which attackers use them to gain access to your company. These simulated attacks help employees understand the different forms of phishing attempts and identify them properly to prevent unauthorized access.
For IT and Security professionals, a phishing test boosts employee cyber security awareness in a real-life scenario and meaningful way that will have a lasting effect on the employee’s security state of mind. Employees walk away with experience and knowledge in the realm of phishing.
What Does the Test Entail?
CyanLine security professionals will ask some basic questions about what type of email service you are using, such as Google Suite or Office 365. These questions are important because we need to tailor the test to your email service provider in order to bypass your spam settings, just as a real life attacker would.
Once CyanLine knows this information, we will need to know how many employees the phishing scenario will go to, as well as what type of phishing email you would like the employees to receive. CyanLine has the capability of sending over 600 emails per day. No organization is too small or large for a phishing simulation.
The test will generally include a link to a fake web page, prompting the user to enter credentials. Every action the target user takes within that email, CyanLine can record for record and reporting purposes only. At no time, will CyanLine ever share this data.
Once the scenario is completed, CyanLine generates a report. The report includes:
User’s name, and email
If the user opened the email or not
If the user clicked the link inside of the email
If the user entered their credentials
All interactions within the email are logged with a full timestamp of date and time.