An Active Security Test and Training Opportunity
CyanLine has the capability of performing an authorized phishing simulation to train employees. An effective phishing campaign, when done properly, can make the difference in your employee who clicks on malicious links and opens attachments that will harm your organization.
Real-time phishing simulations have been proven to double employee awareness retention rates versus other cyber security training tactics, such as classroom lecture.
What Is A Phishing Test, Exactly?
A phishing test is often used by security and IT professionals to create a mock scenario that consists of emails and/or web pages that are sent to your employees. These fake attacks simulate real life engagements that have not only been seen in the wild before, but also replicate the methods attackers use to gain access to your company. These simulated attacks help employees understand the different forms of phishing attempts and identify them properly to prevent unauthorized access.
For IT and Security professionals, a phishing test boosts employee cyber security awareness in a real-life scenario and meaningful way that will have a lasting effect on the employee’s security state of mind. Employees walk away with experience and knowledge in the realm of phishing.
What Does the Test Entail?
CyanLine security professionals will ask some basic questions about what type of email service you are using, such as Google Suite or Office 365. These questions are important because we need to tailor the test to your email service provider in order to bypass your spam settings, just as a real life attacker would.
Once CyanLine knows this information, we will need to know how many employees the phishing scenario will go to, as well as what type of phishing email you would like the employees to receive. CyanLine has the capability of sending over 600 emails per day. No organization is too small or large for a phishing simulation.
The test will generally include a link to a fake web page, prompting the user to enter credentials. Every action the target user takes within that email, CyanLine can record for data and reporting purposes only. At no time will CyanLine ever share this data.
Once the scenario is completed, CyanLine generates a report. The report includes:
- User’s name and email
- If the user opened the email or not
- If the user clicked the link inside of the email
- If the user entered their credentials
- Log of all interactions within the email with a full timestamp of date and time