Basic Tests

We provide basic testing to evaluate the percentage of your users/employees who are susceptible to phishing attacks. This is achieved through simulating phishing attacks, also known as social engineering.

"We phish" your employees for a good cause.

We offer fully automated phishing simulations with thousands of multi-purpose templates and various themes from the phishing community, including fake banking websites.

Results and reports are provided on a weekly basis.

Reports are provided on a weekly basis, indicating the extent to which your company's executives are properly trained. These reports include statistical data and graphs related to both security awareness and phishing.

 

PLATFORM FEATURES

Smart Groups

With the powerful new feature of Smart Groups, we utilize the behavior of each employee and their user characteristics to customize phishing campaigns, training assignments, remedial learning, and reporting according to your preferences. This allows for a highly personalized and effective approach.

Customized Phishing Pages

In addition to the provided templates, we can customize scenarios based on personal information, creating targeted spear phishing campaigns. Each phishing template can have its own customized page and specifically capture sensitive information from the phishing attempt.

Customized Attachments

The customized Phishing Templates we have can include simulated attachments in the following formats: Word, Excel, PowerPoint, and PDF (as well as zipped versions of files).

Advanced Reporting

You'll be able to see reports from training and phishing campaigns, and even an overview of the last 5 campaigns. With over 50+ built-in reports, information is also obtained that provides a holistic view of your entire organization with very detailed reporting on key awareness training indicators.

Your own comprehensive Security Awareness Training Program

More than ever, the lack of knowledge of your executives is the weak link in your company's network security. They need to be carefully trained so that after the training they are ready and have security first and foremost on their minds.

CAN YOU PHISH ME is the first Security Awareness platform in Greece with over 1,000 phishing techniques ready to train you!

Our platform offers you self-service login and phishing security tests before and after the training that show you the percentage of end users who are susceptible to phishing attacks.

Measure the security awareness of users and measure the culture posture of your organisation.

These two scientific evaluations help you to adapt the training to address gaps and weaknesses, and to monitor the impact of your safety awareness training programme and to improve your users' knowledge and sense of safety awareness over time.

See first hand if your organization or company can pass and collect the 7 levels of security and the 7 dimensions of security culture from your baseline assessment and research and even track the continuous improvement of your organization.

With our innovative end-user security awareness training interface, your users will have access to ongoing and new training materials to help them evaluate any social engineering attack that happens to your company.

With our platform, your users will be entitled 24/7 to defined training that will facilitate learning anytime and anywhere they are.

Do you want to complement your security awareness training content with your organization's customized training or other corporate training content?

Now you can! We upload your own training video and manage it along with your training content all in one place.

Too many IT professionals don't know exactly where to start when it comes to creating a security awareness program that works for their organization.

Our platform allows you to create a customized program for your organization that helps you implement all the steps to run a complete Security Awareness Training Program in just a few minutes.

Why should I train my employees?

Ransomware, Hackers, Phishing, Industrial Espionage! FOR THIS REASON!!!!!

Our Platform

specialises in ensuring that your employees understand

the mechanisms of spam, phishing, spear phishing, malware,

ransomware and social engineering as they will be able to apply

this knowledge with their daily practice.

Phishing

We can schedule regular tests on the Phishing Security Tests (PST) which has more than 1000 templates. We can also create your own custom phishing templates.

Δείτε σε τι επίπεδο βρίσκεστε!

Track the percentages of your employees who are susceptible to phishing over time and watch how performance compares from the initial baseline phishing test, after 90 days and after 1 year.
With regular phishing security testing and security awareness training campaigns, you'll see how your Human Firewall improves over time, helping to reduce risk and improve your IT security defenses.

Great information to share with the management team!

Our Phishing Reply service allows you to track whether a user replies to a simulated phishing email and can record the information sent in the reply.

You can also track the links selected by users, as well as control and monitor whether users open Office attachments and then trigger macros.

If an employee falls victim to one of these simulated phishing attacks, you have many options for remediation, including immediate remedial online training. We can schedule one-time, weekly, bi-weekly or monthly simulated phishing attacks and immediately see which employees fall victim to these social engineering attacks.

Enterprise-strength Reporting

You will receive operational strength reports with Advanced Reporting features that will provide you with metrics that can be used for security awareness on security issues.

Executives gain the insight they need to maximise the return on their safety awareness training and monitor safety compliance. The administrator console provides instant graphs of training effectiveness.

Social engineering (Social engineering)

Definition

Social engineering is the act of verbally manipulating people in order to extract information.


Although similar to trickery or simple fraud, the term is mainly associated with deceiving individuals in order to obtain confidential information necessary to access a computer system.

Usually the practitioner never comes face to face with the person who is cheating or deceiving. Although the term may not be accurate or successful it is now well established.

How it works

It relies mainly on human curiosity or greed and ignorance. Many people think that a good antiviral protects them but these only work for widely known viruses and for widely known techniques and not for a specially made "virus". Many also, either out of credulity or out of politeness, will not refuse to give evidence to someone who asks politely or under supposed 'pressure'.

The immediate goal is not always to reveal the code. For someone who wants to infiltrate a computer system, it is sometimes enough to know the version number of the operating system or other programs used by the user. With this information he can find out if there are "holes" in the programs and exploit them.

Other information that can be collected, which may be useful, such as dates of birth, names of children, names of persons responsible for computerisation, etc. are collected either through chat or from the so-called social networks or from the company's websites.

This information is later used in conversation, whether by phone, email or instant messaging, to convince the victim that he or she is an acquaintance and thus extract even more information or, even better, a password.

OUR TARGET

Our aim is to train the staff of a company or employer organisation through a training, monitoring and performance monitoring platform that supports a wide range of safety training programmes.

The main topics covered by the training platform include, among others:

1. Credit Card Security
2. Create & Manage Strong Passwords
3. Secure Management of Sensitive Data
4. Safe Navigation
5. Safe use of Social Media
6. Corporate Email Breach Attacks (BEC Scams)
7. Ransomware attacks
8. E-mail Spoofing attacks
9. Malware Attacks
10. Phishing attacks
11. USB attacks
12. Social Engineering
13. Data Classification (Data Classification)
14. Creating a "Human Firewall" (Human Firewall)
15. User Recognition and Identification
16. Safety When Using Mobile Devices
17. Safe Internet Behaviour
18. Call Center & Help Desk Awareness (Call Center & Help Desk Awareness)
19. Raising awareness of the Top Safety Issues
20. Raising the awareness of Managers on issues of Computer Security & Data Protection
21. Safety in the Work Environment
22. Understanding Encryption

As secure as our company's operating systems are, e.g. firewalls, antivirus, etc., the weakest link is the human factor where the wrong click can cause a lot of damage.

 

CONTACT US REGARDING OUR SERVICES AND PRODUCTS. WE WILL GUIDE YOU TO THE BEST SOLUTION.