Phishing
The security of mail servers is particularly important, as phishing emails also reach you through them. Essentially, there are two different techniques in phishing: intercepting credentials and executing malicious files. With credentials, attackers can log into systems and often gain access to the company infrastructure. When malicious files are executed, they typically gain direct access to the workstation and thus to the company infrastructure.
We offer technical testing of your mail server in the form of mail security checks.
Why conduct phishing campaigns
Our main reasons for phishing campaigns:
- Measuring the awareness level of employees regarding phishing emails
- Defense and detection of phishing emails must occur on two levels: technical and through employee awareness training
- By reviewing a phishing campaign and deriving measures, employee awareness of phishing emails is sharpened
When to conduct phishing campaigns
In our view, the best times are:
- If you want to first find out how well employees recognize phishing emails and potentially derive measures to increase awareness
- Regularly, to measure how effective conducted awareness training is
Results
Typical results of phishing campaigns are:
- Statistical analysis of how many employees interacted with the phishing email and to what extent (results are anonymized)
- Recommendations based on the results for further steps to increase the awareness level
What we need from you
For a phishing campaign, we need from you:
- Recipient list with first names, last names, and email addresses
Book a free initial consultation now
Whether it’s a pentest, red teaming, or “something in between”—
we look forward to talking to you!