Phishing

The security of mail servers is particularly important, as phishing emails also reach you through them. Essentially, there are two different techniques in phishing: intercepting credentials and executing malicious files. With credentials, attackers can log into systems and often gain access to the company infrastructure. When malicious files are executed, they typically gain direct access to the workstation and thus to the company infrastructure.

We offer technical testing of your mail server in the form of mail security checks.

Why conduct phishing campaigns

s

Our main reasons for phishing campaigns:

  • Measuring the awareness level of employees regarding phishing emails
  • Defense and detection of phishing emails must occur on two levels: technical and through employee awareness training
  • By reviewing a phishing campaign and deriving measures, employee awareness of phishing emails is sharpened

 

When to conduct phishing campaigns

In our view, the best times are:

  • If you want to first find out how well employees recognize phishing emails and potentially derive measures to increase awareness
  • Regularly, to measure how effective conducted awareness training is

 

Results

i

Typical results of phishing campaigns are:

  • Statistical analysis of how many employees interacted with the phishing email and to what extent (results are anonymized)
  • Recommendations based on the results for further steps to increase the awareness level

 

What we need from you

For a phishing campaign, we need from you:

  • Recipient list with first names, last names, and email addresses

 

Book a free initial consultation now

Whether it’s a pentest, red teaming, or “something in between”—
we look forward to talking to you!