SlideShare a Scribd company logo
EDUCATE YOUR USERS
NOT TO TAKE THE BAIT:
INTRODUCTION TO PHISHING AS A SERVICE
1
www.secdata.com
2
WHAT IS PHISHING?
Phishing (noun)
The fraudulent practice of sending emails purporting to be from
reputable companies in order to induce individuals to reveal
personal information, such as passwords and credit card numbers,
online.
3
WE’RE ALL ON THE HOOK
Phishing costs the UK £278 million
annually
Only 1 in 5 emails are genuine
450,000 phishing attacks in 2013
worldwide; 31% targeted the UK
Today, phishing attacks are more frequent, more damaging…
720 brands known to be targeted
by phishing in 2013
$5.9 billion – the global cost of
phishing last year
4
WE’RE ALL ON THE HOOK
MORE
TARGETED:
Social media has handed
personalised information
to scammers
“Spear-phishing” with
personalised attacks is
simple to do based on
friends, known purchases
etc etc
MORE
VECTORS:
Attacks can come from
anywhere.
Phishing attacks have
been delivered through
instant messaging, mobile
apps, social networks,
online marketplaces and
even SMS text messaging
MORE
TRUST:
Users increasingly rely
on online brands.
Cyber criminals exploit
trusted brands by
creating fake emails
that are very difficult to
distinguish from the
genuine article.
…and more sophisticated:
5
TARGETING THE WEAKEST LINK
People are the weakest link in
the security chain.
Phishing is so successful
precisely because it targets
your users, not your
technology.
Users, not technology, create 80%
of all IT security breaches
58% of untrained employees will
click on phishing emails
91% of targeted attacks now
involve spear-phishing emails
You are only as secure as your
least security conscious employee
EDUCATION IS THE BEST DEFENCE
6
Many technologies can
counter phishing attacks,
but none are 100%
effective.
The best protection is to
educate your users on the
dangers so they can play
an active role in your
defence.
Only by understanding how
susceptible your users are
to phishing can your
organisation take action to
reduce risk.
7
PHISHING AS A SERVICE
Phishing as a Service
• Simulate an attack to realistically assess
your risk
• Identify specific vulnerabilities within your
user organisation
• Detailed reports provide a clear view of your
organisation's vulnerabilities and how to
address them
ASSESS RISK REDUCE VULNERABILITY
• Track users over time to identify who
requires further training
• Educate your users on the dangers so they
can play an active role in your defence
• Teach users about security best practices
• Show users on how to protect themselves in
specific situations or on certain devices
Launch and monitor simulated
phishing attacks on your users
HOW THE SERVICE WORKS
8
Simulated attacks on
the users you select at
frequent, but
unpredictable intervals
Emails accurately
simulate attacks. E.g.
They redirect users to
custom-built fake
login screens
Victims are taken to
pages that explain
their mistake and how
to better protect
themselves
Detailed reporting: how many users clicked on phishing emails, opened links or
submitted information
Visibility into where to apply additional training is the bedrock of making your
organisation more resistant to phishing
FEATURES AND BENEFITS
9
• Easy to deploy service - no hardware
or software needed
• Total control over the length, duration
and targets of the simulated phishing
campaign
• Victims of the simulated attack receive
notification pages educating them on
security best practice
• Detailed reports on business impact
• Easily monitor your organisation’s risk
over time
FEATURES
• Harden your business against Phishing
and reduce risk
• Maximise security spend on educating
user security defences
• Identify where to invest in further
security training or new security
solutions
• Protect yourself quickly through a
rapidly deployed service
• Practical demonstrations of phishing
are proven to impact behaviour over
training and policy information
BENEFITS
10
IN SUMMARY – IT WORKS
of users are less likely
to fall victim to a future
attack after training80%
Employees that click on
phishing emails can be
reduced to just 2%
Questions?
11
Etienne Greeff
CEO
etienne.greeff@secdata.com
+44 1622 723400
www.secdata.com
Ad

More Related Content

What's hot (20)

Ransomware
RansomwareRansomware
Ransomware
DeepakKumar4980
 
Social media security
Social media securitySocial media security
Social media security
n|u - The Open Security Community
 
Phishing Education
Phishing EducationPhishing Education
Phishing Education
BrandProtect
 
Cyber Security Report 2019
Cyber Security Report 2019Cyber Security Report 2019
Cyber Security Report 2019
Omar Bshara
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
Nikhil D
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
harsh arora
 
CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04
Kyle Lai
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacks
dinCloud Inc.
 
Viruses, Biometrics And Encryption
Viruses, Biometrics And EncryptionViruses, Biometrics And Encryption
Viruses, Biometrics And Encryption
smithj12
 
Cyber Security Demistyified
Cyber Security DemistyifiedCyber Security Demistyified
Cyber Security Demistyified
Microsoft UK
 
StMaarten-workshop-final
StMaarten-workshop-finalStMaarten-workshop-final
StMaarten-workshop-final
Anton Kaska
 
Latest Top 10 Types of Cyber Security Threats
Latest Top 10 Types of Cyber Security ThreatsLatest Top 10 Types of Cyber Security Threats
Latest Top 10 Types of Cyber Security Threats
B R SOFTECH PVT LTD
 
CERT-GOV-MD: Cyber Security in Moldova: Challenges and Responses
CERT-GOV-MD: Cyber Security in Moldova: Challenges and ResponsesCERT-GOV-MD: Cyber Security in Moldova: Challenges and Responses
CERT-GOV-MD: Cyber Security in Moldova: Challenges and Responses
S.E. CTS CERT-GOV-MD
 
Cyber security snowe vazeer
Cyber security snowe vazeerCyber security snowe vazeer
Cyber security snowe vazeer
snowe123
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
DominikaJoanna
 
Introduction to malvertising
Introduction to malvertising Introduction to malvertising
Introduction to malvertising
Mohd Arif
 
Cyber security
Cyber securityCyber security
Cyber security
manoj duli
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
Dominic Rajesh
 
Tools and methods used in cyber crime
Tools and methods used in cyber crimeTools and methods used in cyber crime
Tools and methods used in cyber crime
shubhravrat Deshpande
 
Data security for healthcare industry
Data security for healthcare industryData security for healthcare industry
Data security for healthcare industry
Seqrite
 
Phishing Education
Phishing EducationPhishing Education
Phishing Education
BrandProtect
 
Cyber Security Report 2019
Cyber Security Report 2019Cyber Security Report 2019
Cyber Security Report 2019
Omar Bshara
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
Nikhil D
 
CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04
Kyle Lai
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacks
dinCloud Inc.
 
Viruses, Biometrics And Encryption
Viruses, Biometrics And EncryptionViruses, Biometrics And Encryption
Viruses, Biometrics And Encryption
smithj12
 
Cyber Security Demistyified
Cyber Security DemistyifiedCyber Security Demistyified
Cyber Security Demistyified
Microsoft UK
 
StMaarten-workshop-final
StMaarten-workshop-finalStMaarten-workshop-final
StMaarten-workshop-final
Anton Kaska
 
Latest Top 10 Types of Cyber Security Threats
Latest Top 10 Types of Cyber Security ThreatsLatest Top 10 Types of Cyber Security Threats
Latest Top 10 Types of Cyber Security Threats
B R SOFTECH PVT LTD
 
CERT-GOV-MD: Cyber Security in Moldova: Challenges and Responses
CERT-GOV-MD: Cyber Security in Moldova: Challenges and ResponsesCERT-GOV-MD: Cyber Security in Moldova: Challenges and Responses
CERT-GOV-MD: Cyber Security in Moldova: Challenges and Responses
S.E. CTS CERT-GOV-MD
 
Cyber security snowe vazeer
Cyber security snowe vazeerCyber security snowe vazeer
Cyber security snowe vazeer
snowe123
 
Introduction to malvertising
Introduction to malvertising Introduction to malvertising
Introduction to malvertising
Mohd Arif
 
Cyber security
Cyber securityCyber security
Cyber security
manoj duli
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
Dominic Rajesh
 
Tools and methods used in cyber crime
Tools and methods used in cyber crimeTools and methods used in cyber crime
Tools and methods used in cyber crime
shubhravrat Deshpande
 
Data security for healthcare industry
Data security for healthcare industryData security for healthcare industry
Data security for healthcare industry
Seqrite
 

Viewers also liked (20)

Presentació mTalent Barcelona 12/06/2014
Presentació mTalent Barcelona 12/06/2014Presentació mTalent Barcelona 12/06/2014
Presentació mTalent Barcelona 12/06/2014
Alejandro Castellano Sans
 
Vernetzung Zum Verhältnis von klassischen Formen der Archiverschließung und I...
VernetzungZum Verhältnis von klassischen Formen der Archiverschließung und I...VernetzungZum Verhältnis von klassischen Formen der Archiverschließung und I...
Vernetzung Zum Verhältnis von klassischen Formen der Archiverschließung und I...
Georg Vogeler
 
Nueva Guía Rápida de Formación- Cisdet 2014-2015
Nueva Guía Rápida de Formación- Cisdet 2014-2015Nueva Guía Rápida de Formación- Cisdet 2014-2015
Nueva Guía Rápida de Formación- Cisdet 2014-2015
Centro Internacional Superior de Desarrollo de Empresas y Talento
 
E tips educational resources online
E tips educational resources onlineE tips educational resources online
E tips educational resources online
Lews Castle College, University of the Highlands and Islands
 
ANEXE
ANEXEANEXE
ANEXE
ana pircan
 
Sin E Mail
Sin E MailSin E Mail
Sin E Mail
Promociones Mexico Marketing
 
Azura Mohd Noor & Ram Al Jaffri Saad
Azura Mohd Noor & Ram Al Jaffri SaadAzura Mohd Noor & Ram Al Jaffri Saad
Azura Mohd Noor & Ram Al Jaffri Saad
idmac2015
 
Poverty...
Poverty...Poverty...
Poverty...
Tanvizzz
 
tesina siluk_caorsi 2013
tesina siluk_caorsi 2013tesina siluk_caorsi 2013
tesina siluk_caorsi 2013
Constanza Caorsi
 
Dealerguide
DealerguideDealerguide
Dealerguide
Azhar Abu
 
Borang Permohonan Kursus Pengubatan Islam (Kumpulan 6/2015) Darussyifa' Sarawak
Borang Permohonan Kursus Pengubatan Islam (Kumpulan 6/2015) Darussyifa' SarawakBorang Permohonan Kursus Pengubatan Islam (Kumpulan 6/2015) Darussyifa' Sarawak
Borang Permohonan Kursus Pengubatan Islam (Kumpulan 6/2015) Darussyifa' Sarawak
Mohd Puad Abdullah
 
MTE Catálogo 2013
MTE Catálogo 2013MTE Catálogo 2013
MTE Catálogo 2013
mapplemkt
 
Redes Sociales en la Educacion
Redes Sociales en la EducacionRedes Sociales en la Educacion
Redes Sociales en la Educacion
Universidad Tecnológica de México - UNITEC
 
Airports on twitter 2015
Airports on twitter 2015Airports on twitter 2015
Airports on twitter 2015
Sven Solterbeck
 
Privacy & Data Protection: Subject Access Requests
Privacy & Data Protection: Subject Access RequestsPrivacy & Data Protection: Subject Access Requests
Privacy & Data Protection: Subject Access Requests
Peppe Santoro
 
Memoria alma2010
Memoria alma2010Memoria alma2010
Memoria alma2010
Laura León Morillo
 
T.5.
T.5.T.5.
T.5.
Maria Constanza Bl Enfermera
 
Seminário Paulo e Estevão 5 de maio 2013
Seminário Paulo e Estevão 5 de maio 2013Seminário Paulo e Estevão 5 de maio 2013
Seminário Paulo e Estevão 5 de maio 2013
Anderson Santos
 
Vernetzung Zum Verhältnis von klassischen Formen der Archiverschließung und I...
VernetzungZum Verhältnis von klassischen Formen der Archiverschließung und I...VernetzungZum Verhältnis von klassischen Formen der Archiverschließung und I...
Vernetzung Zum Verhältnis von klassischen Formen der Archiverschließung und I...
Georg Vogeler
 
Azura Mohd Noor & Ram Al Jaffri Saad
Azura Mohd Noor & Ram Al Jaffri SaadAzura Mohd Noor & Ram Al Jaffri Saad
Azura Mohd Noor & Ram Al Jaffri Saad
idmac2015
 
Poverty...
Poverty...Poverty...
Poverty...
Tanvizzz
 
Borang Permohonan Kursus Pengubatan Islam (Kumpulan 6/2015) Darussyifa' Sarawak
Borang Permohonan Kursus Pengubatan Islam (Kumpulan 6/2015) Darussyifa' SarawakBorang Permohonan Kursus Pengubatan Islam (Kumpulan 6/2015) Darussyifa' Sarawak
Borang Permohonan Kursus Pengubatan Islam (Kumpulan 6/2015) Darussyifa' Sarawak
Mohd Puad Abdullah
 
MTE Catálogo 2013
MTE Catálogo 2013MTE Catálogo 2013
MTE Catálogo 2013
mapplemkt
 
Airports on twitter 2015
Airports on twitter 2015Airports on twitter 2015
Airports on twitter 2015
Sven Solterbeck
 
Privacy & Data Protection: Subject Access Requests
Privacy & Data Protection: Subject Access RequestsPrivacy & Data Protection: Subject Access Requests
Privacy & Data Protection: Subject Access Requests
Peppe Santoro
 
Seminário Paulo e Estevão 5 de maio 2013
Seminário Paulo e Estevão 5 de maio 2013Seminário Paulo e Estevão 5 de maio 2013
Seminário Paulo e Estevão 5 de maio 2013
Anderson Santos
 
Ad

Similar to Educate Your Users Not To Take The Bait: Introduction To Phishing As A Service (20)

Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
Education 2Conf
 
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
IRJET Journal
 
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
AwodiranOlumide
 
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdfSafeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
CIOWomenMagazine
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study Jams
GDSCCVR
 
Phishing 101: Part-2 Blog Welcome to this Phishing Blog Part2
Phishing 101: Part-2 Blog Welcome to this Phishing Blog Part2Phishing 101: Part-2 Blog Welcome to this Phishing Blog Part2
Phishing 101: Part-2 Blog Welcome to this Phishing Blog Part2
abhishekbacklink
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools Tactics
Ben Graybar
 
Avoiding the Top Social Media Frauds in 2024 Protective Measures.pptx
Avoiding the Top Social Media Frauds in 2024 Protective Measures.pptxAvoiding the Top Social Media Frauds in 2024 Protective Measures.pptx
Avoiding the Top Social Media Frauds in 2024 Protective Measures.pptx
afiyashaikh25
 
Blue and White Minimal Professional Business Project Presentation .pptx
Blue and White Minimal Professional Business Project Presentation .pptxBlue and White Minimal Professional Business Project Presentation .pptx
Blue and White Minimal Professional Business Project Presentation .pptx
jennblair0830
 
Phishing 101: Part-1 Blog Welcome to this Phishing Blog Part1.
Phishing 101: Part-1 Blog Welcome to this Phishing Blog Part1.Phishing 101: Part-1 Blog Welcome to this Phishing Blog Part1.
Phishing 101: Part-1 Blog Welcome to this Phishing Blog Part1.
abhishekbacklink
 
Cybersecurity note for students reference
Cybersecurity note for students referenceCybersecurity note for students reference
Cybersecurity note for students reference
sitihajar250855
 
Computer Science Power point presentation PPT on Cyber Security11.pptx
Computer Science Power point presentation PPT on Cyber Security11.pptxComputer Science Power point presentation PPT on Cyber Security11.pptx
Computer Science Power point presentation PPT on Cyber Security11.pptx
laptopemail70
 
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2Conf
 
Intelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionIntelligence-Driven Fraud Prevention
Intelligence-Driven Fraud Prevention
EMC
 
Responsible Digital Citizensip in the 21st Century.ppt
Responsible Digital Citizensip in the 21st Century.pptResponsible Digital Citizensip in the 21st Century.ppt
Responsible Digital Citizensip in the 21st Century.ppt
ruthpanash
 
Information and Cyber Warfare
Information and Cyber WarfareInformation and Cyber Warfare
Information and Cyber Warfare
Swapnil Jagtap
 
Advance Web Vulnerabilities (A tutoring)
Advance Web Vulnerabilities (A tutoring)Advance Web Vulnerabilities (A tutoring)
Advance Web Vulnerabilities (A tutoring)
arjayVicencio
 
E Mail Phishing Prevention and Detection
E Mail Phishing Prevention and DetectionE Mail Phishing Prevention and Detection
E Mail Phishing Prevention and Detection
ijtsrd
 
Phishing website method
Phishing website methodPhishing website method
Phishing website method
arelyf_7
 
The Need for Internet Security for Small Businesses - 10 Best Practices | The...
The Need for Internet Security for Small Businesses - 10 Best Practices | The...The Need for Internet Security for Small Businesses - 10 Best Practices | The...
The Need for Internet Security for Small Businesses - 10 Best Practices | The...
TheEntrepreneurRevie
 
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
Education 2Conf
 
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
IRJET Journal
 
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
AwodiranOlumide
 
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdfSafeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
CIOWomenMagazine
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study Jams
GDSCCVR
 
Phishing 101: Part-2 Blog Welcome to this Phishing Blog Part2
Phishing 101: Part-2 Blog Welcome to this Phishing Blog Part2Phishing 101: Part-2 Blog Welcome to this Phishing Blog Part2
Phishing 101: Part-2 Blog Welcome to this Phishing Blog Part2
abhishekbacklink
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools Tactics
Ben Graybar
 
Avoiding the Top Social Media Frauds in 2024 Protective Measures.pptx
Avoiding the Top Social Media Frauds in 2024 Protective Measures.pptxAvoiding the Top Social Media Frauds in 2024 Protective Measures.pptx
Avoiding the Top Social Media Frauds in 2024 Protective Measures.pptx
afiyashaikh25
 
Blue and White Minimal Professional Business Project Presentation .pptx
Blue and White Minimal Professional Business Project Presentation .pptxBlue and White Minimal Professional Business Project Presentation .pptx
Blue and White Minimal Professional Business Project Presentation .pptx
jennblair0830
 
Phishing 101: Part-1 Blog Welcome to this Phishing Blog Part1.
Phishing 101: Part-1 Blog Welcome to this Phishing Blog Part1.Phishing 101: Part-1 Blog Welcome to this Phishing Blog Part1.
Phishing 101: Part-1 Blog Welcome to this Phishing Blog Part1.
abhishekbacklink
 
Cybersecurity note for students reference
Cybersecurity note for students referenceCybersecurity note for students reference
Cybersecurity note for students reference
sitihajar250855
 
Computer Science Power point presentation PPT on Cyber Security11.pptx
Computer Science Power point presentation PPT on Cyber Security11.pptxComputer Science Power point presentation PPT on Cyber Security11.pptx
Computer Science Power point presentation PPT on Cyber Security11.pptx
laptopemail70
 
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2Conf
 
Intelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionIntelligence-Driven Fraud Prevention
Intelligence-Driven Fraud Prevention
EMC
 
Responsible Digital Citizensip in the 21st Century.ppt
Responsible Digital Citizensip in the 21st Century.pptResponsible Digital Citizensip in the 21st Century.ppt
Responsible Digital Citizensip in the 21st Century.ppt
ruthpanash
 
Information and Cyber Warfare
Information and Cyber WarfareInformation and Cyber Warfare
Information and Cyber Warfare
Swapnil Jagtap
 
Advance Web Vulnerabilities (A tutoring)
Advance Web Vulnerabilities (A tutoring)Advance Web Vulnerabilities (A tutoring)
Advance Web Vulnerabilities (A tutoring)
arjayVicencio
 
E Mail Phishing Prevention and Detection
E Mail Phishing Prevention and DetectionE Mail Phishing Prevention and Detection
E Mail Phishing Prevention and Detection
ijtsrd
 
Phishing website method
Phishing website methodPhishing website method
Phishing website method
arelyf_7
 
The Need for Internet Security for Small Businesses - 10 Best Practices | The...
The Need for Internet Security for Small Businesses - 10 Best Practices | The...The Need for Internet Security for Small Businesses - 10 Best Practices | The...
The Need for Internet Security for Small Businesses - 10 Best Practices | The...
TheEntrepreneurRevie
 
Ad

More from SecureData Europe (8)

SecureData GI
SecureData GISecureData GI
SecureData GI
SecureData Europe
 
FINE-TUNE IPS TO DIAL UP SECURITY
FINE-TUNE IPS TO DIAL UP SECURITYFINE-TUNE IPS TO DIAL UP SECURITY
FINE-TUNE IPS TO DIAL UP SECURITY
SecureData Europe
 
Managed Security Services On The Rise
Managed Security Services On The RiseManaged Security Services On The Rise
Managed Security Services On The Rise
SecureData Europe
 
Managed Next Generation Firewall Service
Managed Next Generation Firewall ServiceManaged Next Generation Firewall Service
Managed Next Generation Firewall Service
SecureData Europe
 
Incident Response: Tools & Techniques
Incident Response: Tools & TechniquesIncident Response: Tools & Techniques
Incident Response: Tools & Techniques
SecureData Europe
 
Balance Risk With Better Threat Detection
Balance Risk With Better Threat DetectionBalance Risk With Better Threat Detection
Balance Risk With Better Threat Detection
SecureData Europe
 
New Battle Lines for Security
New Battle Lines for SecurityNew Battle Lines for Security
New Battle Lines for Security
SecureData Europe
 
SORT OUT YOUR SIEM
SORT OUT YOUR SIEMSORT OUT YOUR SIEM
SORT OUT YOUR SIEM
SecureData Europe
 
FINE-TUNE IPS TO DIAL UP SECURITY
FINE-TUNE IPS TO DIAL UP SECURITYFINE-TUNE IPS TO DIAL UP SECURITY
FINE-TUNE IPS TO DIAL UP SECURITY
SecureData Europe
 
Managed Security Services On The Rise
Managed Security Services On The RiseManaged Security Services On The Rise
Managed Security Services On The Rise
SecureData Europe
 
Managed Next Generation Firewall Service
Managed Next Generation Firewall ServiceManaged Next Generation Firewall Service
Managed Next Generation Firewall Service
SecureData Europe
 
Incident Response: Tools & Techniques
Incident Response: Tools & TechniquesIncident Response: Tools & Techniques
Incident Response: Tools & Techniques
SecureData Europe
 
Balance Risk With Better Threat Detection
Balance Risk With Better Threat DetectionBalance Risk With Better Threat Detection
Balance Risk With Better Threat Detection
SecureData Europe
 
New Battle Lines for Security
New Battle Lines for SecurityNew Battle Lines for Security
New Battle Lines for Security
SecureData Europe
 

Recently uploaded (20)

Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
Drupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy ConsumptionDrupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy Consumption
Exove
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
 
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
Drupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy ConsumptionDrupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy Consumption
Exove
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
 
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul
 

Educate Your Users Not To Take The Bait: Introduction To Phishing As A Service

  • 1. EDUCATE YOUR USERS NOT TO TAKE THE BAIT: INTRODUCTION TO PHISHING AS A SERVICE 1 www.secdata.com
  • 2. 2 WHAT IS PHISHING? Phishing (noun) The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers, online.
  • 3. 3 WE’RE ALL ON THE HOOK Phishing costs the UK £278 million annually Only 1 in 5 emails are genuine 450,000 phishing attacks in 2013 worldwide; 31% targeted the UK Today, phishing attacks are more frequent, more damaging… 720 brands known to be targeted by phishing in 2013 $5.9 billion – the global cost of phishing last year
  • 4. 4 WE’RE ALL ON THE HOOK MORE TARGETED: Social media has handed personalised information to scammers “Spear-phishing” with personalised attacks is simple to do based on friends, known purchases etc etc MORE VECTORS: Attacks can come from anywhere. Phishing attacks have been delivered through instant messaging, mobile apps, social networks, online marketplaces and even SMS text messaging MORE TRUST: Users increasingly rely on online brands. Cyber criminals exploit trusted brands by creating fake emails that are very difficult to distinguish from the genuine article. …and more sophisticated:
  • 5. 5 TARGETING THE WEAKEST LINK People are the weakest link in the security chain. Phishing is so successful precisely because it targets your users, not your technology. Users, not technology, create 80% of all IT security breaches 58% of untrained employees will click on phishing emails 91% of targeted attacks now involve spear-phishing emails You are only as secure as your least security conscious employee
  • 6. EDUCATION IS THE BEST DEFENCE 6 Many technologies can counter phishing attacks, but none are 100% effective. The best protection is to educate your users on the dangers so they can play an active role in your defence. Only by understanding how susceptible your users are to phishing can your organisation take action to reduce risk.
  • 7. 7 PHISHING AS A SERVICE Phishing as a Service • Simulate an attack to realistically assess your risk • Identify specific vulnerabilities within your user organisation • Detailed reports provide a clear view of your organisation's vulnerabilities and how to address them ASSESS RISK REDUCE VULNERABILITY • Track users over time to identify who requires further training • Educate your users on the dangers so they can play an active role in your defence • Teach users about security best practices • Show users on how to protect themselves in specific situations or on certain devices Launch and monitor simulated phishing attacks on your users
  • 8. HOW THE SERVICE WORKS 8 Simulated attacks on the users you select at frequent, but unpredictable intervals Emails accurately simulate attacks. E.g. They redirect users to custom-built fake login screens Victims are taken to pages that explain their mistake and how to better protect themselves Detailed reporting: how many users clicked on phishing emails, opened links or submitted information Visibility into where to apply additional training is the bedrock of making your organisation more resistant to phishing
  • 9. FEATURES AND BENEFITS 9 • Easy to deploy service - no hardware or software needed • Total control over the length, duration and targets of the simulated phishing campaign • Victims of the simulated attack receive notification pages educating them on security best practice • Detailed reports on business impact • Easily monitor your organisation’s risk over time FEATURES • Harden your business against Phishing and reduce risk • Maximise security spend on educating user security defences • Identify where to invest in further security training or new security solutions • Protect yourself quickly through a rapidly deployed service • Practical demonstrations of phishing are proven to impact behaviour over training and policy information BENEFITS
  • 10. 10 IN SUMMARY – IT WORKS of users are less likely to fall victim to a future attack after training80% Employees that click on phishing emails can be reduced to just 2%

Editor's Notes