Anti-Phishing Training Modules Teach employees to recognize and avoid phishing and spear phishing attacks

Size: px
Start display at page:

Download "Anti-Phishing Training Modules Teach employees to recognize and avoid phishing and spear phishing attacks"

Transcription

1 Anti-Phishing Training Modules Teach employees to recognize and avoid phishing and spear phishing attacks Improve Phishing Knowledge and Reduce Susceptibility to Attack Do you already have some form of security awareness training? Do you know if it is effective? Don t you want to keep improving it? Phishing attacks are getting better every day. Are your users prepared? Minutes of our training can reduce your employee s susceptibility to falling for a phishing attack by over 50%. Wombat can help. We offer the most effective and comprehensive anti-phishing training suite in the market. In addition to our mock phishing attack service, PhishGuru we also offer three different anti-phishing training modules, Anti-Phishing Phil, a training game for identifying malicious URLs, Anti-Phishing Phyllis, an anti-phishing training game, and Security, an interactive anti-phishing training module. Both Anti-Phishing Phyllis and Security software-based training products, teach users to spot phishing traps in s, such as fake links, malicious attachments, cash prizes, reply-to s asking for sensitive information and much more. Each takes just over 5 minutes to complete and includes an extensive collection of randomized legitimate and fraudulent s with key areas highlighted. Users are asked to identify if the highlighted areas are security traps or safe areas in the . The moment after the user makes a decision, they receive immediate feedback for both correct and incorrect answers. We call this moment a teachable moment, a situation when the user is most open to learning and concepts taught are retained for longer periods of time. Wombat s approach of applying learning science principles to software-based training to teach employees how to recognize and avoid phishing attacks, does more than just check the box on security awareness training, it creates behavior change. Anti-Phishing Phyllis Security

2 Anti-Phishing Training Modules Teach employees to recognize and avoid phishing and spear phishing attacks We have developed these two different training products, Anti-Phishing Phyllis and Security on the same topic so that security officers and administrators can select the teaching style that best suits their organization s culture. Both modules teach the same concepts just in different ways. Anti-Phishing Phyllis and Security training products are just one part of the Wombat Security Training Platform that enables security officers to assess employees, deliver training, track results, and gain a comprehensive view of their cyber security posture. The platform provides detailed reports that show aggregate and individual data which can be used to develop follow-up training programs and show user knowledge gained over time. Wombat Core Features and Benefits Engaging and interactive training increases end user participation Learning science principles ensure users learn by doing and retain content much longer Short training modules are focused and respectful of busy schedules Collect valuable data about individual and organizational vulnerability to attack Cost effective - likely to cost less than your current training SCORM compliant to enable integration with your LMS 508-compliant to support people with learning, visual, hearing and physical disabilities Assessment Simulated Phishing Attacks Training Safe Browsing - NEW Security Beyond the Office - NEW Smartphone Security Safe Social Networks Phishing Traps Social Engineering Mobility and Travel Malicious URL Training Password Security Security Reporting Completion Data Average Score Most Missed Items User Activity Contact us today for a demonstration of our complete suite of anti-phishing assessment and training products Henry Street, Third Floor Pittsburgh, PA Wombat Security Technologies, Inc. All rights reserved. Wombat Security Technologies name, logo, PhishPatrol and PhishGuru are all trademarks of Wombat Security Technologies, Inc.

3 PhishGuru Phishing Attack Simulation Service Assess vulnerability and teach employees not to click Reduce your susceptibility by up to 70% Phishing Your Employees: Criminals are Doing It Right Now Every day new phishing s are reaching your employees inboxes and, as a security officer, you are constantly wondering when someone will click, or reply, and expose the company s network and intellectual property. What if you could send your employees phishing s to train them, and what if every person who falls for the phishing is immediately trained what not to do the next time? PhishGuru, a software-as-a-service product, is an easy-to-use tool that assesses and trains employees with simulated phishing s. This creates a unique teachable moment when employees fall for the simulated attack and are open to learning. Just-in-time training explains what they did wrong and how to avoid it the next time. PhishGuru is not a penetration test, it s much more. It s a way to change behavior. Campaign 1 Campaign 2 Campaign viewed and clicked on link Capturing Valuable Security Posture Intelligence Not only are employees being trained, but valuable data is being captured. The intelligence gathered from the mock attacks such as which attacks your organization is most susceptible to, which people are vulnerable, what devices they were using, and how people have changed their behavior after just one mock attack is available instantly. This intelligence can be used to understand your organization s security posture and assign targeted training to the people who need it most. NEW! Our multi-panel training references the specific mock phishing attack that you send, showing users point by point what they did wrong.

4 PhishGuru Phishing Attack Simulation Service Assess vulnerability and teach employees not to click NEW! Customizable s and Training to Meet Your Unique Needs Send a phishing from a number of templates or craft your own Select the training method that suits your organization in terms of style and content Create your own training from our templates using a simple WYSIWYG editor You can edit all content in our training to fit your unique needs. The Wombat Security Training Platform The PhishGuru service is just one of the security awareness tools available in the Wombat Security Training Platform that enables security professionals and administrators to assess employees, deliver training, track results, and improve their cyber security posture. Reporting capabilities in the Platform provide both aggregate and individual data to guide follow-up training programs and show improved results over time. Wombat Core Features and Benefits Engaging and interactive training increases end user participation Learning-science principles ensure users learn key concepts and retain content much longer Short training modules are focused and respectful of busy schedules Training modules based upon scientific research in cyber security and learning science Cost effective likely to cost less than your current training SCORM compliant to enable integration with your Learning Management System (LMS) 508-compliant to support people with learning, visual, hearing and physical disabilities Assessment Phishing Attack Simulation Training Safe Browsing NEW Security Beyond the Office NEW Smartphone Security Social Network Safety Phishing Traps Social Engineering Mobility and Travel Malicious URL Training Password Security Security Reporting Completion Data Average Score Most Missed Items User Activity Combine PhishGuru with Wombat s anti-phishing training modules, for the most comprehensive anti-phishing training available today Henry Street, Third Floor Pittsburgh, PA Wombat Security Technologies, Inc. All rights reserved. Wombat Security Technologies name, logo, PhishPatrol and PhishGuru are all trademarks of Wombat Security Technologies, Inc.

5 Anti-Phishing Phil Training Game Teaches Employees How to Identify Malicious URLs 10-minutes of training can reduce the chance of your employee falling for a phishing attack by over 50% compared to traditional training methods! To drive lasting change in employee behavior, cyber security training must be engaging, efficient and effective. who had played the game to distinguish legitimate URLs from fraudulent ones improved nearly twice as much as that of those trained with standard materials. Like Wombat s other products, Anti-Phishing Phil offers extensive reporting functionality to enable security professionals to track the performance of users and target training appropriately. Classroom training lectures are ineffective; online video training doesn t work. Static cyber security training s don t work. What works to reduce the number of people clicking on dangerous URLS? Wombat s Anti-Phishing Phil training game does! Developed using learning science principles, Anti- Phishing Phil is a SCORM-compliant computer security training game that teaches employees and customers to recognize fraudulent URLs. In just 10 minutes of play, the user makes decisions on the safety of 32 different URLs links. When employees make a mistake they learn why immediately. The latest release of the product incorporates a number of recent phishing attacks and the links used in the attacks. The game can also be customized to incorporate attacks that companies have seen themselves to ensure that employees are prepared. The ability of subjects who had played the game to distinguish legitimate URLs from fraudulent ones improved nearly twice as much as that of those trained with standard materials. - Scientific American Best of all, Anti-Phishing Phil training makes a lasting impact. According to the Scientific American article How to Foil Phishing Scams, which featured Anti-Phishing Phil, the ability of subjects You can deploy Anti-Phishing Phil on your intranet. You can also choose to customize the game by licensing a version with your organization s branding and specific URLs. A 508-compliant version is also available. Contact us to learn more about how we make a lasting change to employee behavior with Anti- Phishing Phil. [email protected] About Wombat Security Technologies With millions of users across North America, Europe, and Asia, Wombat Security Technologies is a global leader in cyber security awareness training and also offers unique anti-phishing filtering solutions. Wombat s products have been licensed for use in sectors as diverse as finance, government, insurance, healthcare, energy, e-tailing, logistics and education to name just a few.

SIMULATED ATTACKS. Evaluate Susceptibility Using PhishGuru, SmishGuru, and USBGuru MEASURE ASSESS

SIMULATED ATTACKS. Evaluate Susceptibility Using PhishGuru, SmishGuru, and USBGuru MEASURE ASSESS SIMULATED ATTACKS Evaluate Susceptibility Using PhishGuru, SmishGuru, and USBGuru Technical safeguards like firewalls, antivirus software, and email filters are critical for defending your infrastructure,

More information

5 Reasons Why Your Security Education Program isn t Working (and how to fix it)

5 Reasons Why Your Security Education Program isn t Working (and how to fix it) 5 Reasons Why Your Security Education Program isn t Working (and how to fix it) February 2015 Presentation Agenda Importance of Secure End User Behavior 5 Reasons Your Program isn t Working 10 Learning

More information

Deploying Continuous and Measurable Security Education for Employees. Security awareness and training methodology and best practices

Deploying Continuous and Measurable Security Education for Employees. Security awareness and training methodology and best practices Deploying Continuous and Measurable Security Education for Employees Security awareness and training methodology and best practices June 2015 Executive Summary Knowing that end users are the last line

More information

Deploying Continuous and Measurable Security Education for Employees. Security awareness and training methodology and best practices

Deploying Continuous and Measurable Security Education for Employees. Security awareness and training methodology and best practices Deploying Continuous and Measurable Security Education for Employees Security awareness and training methodology and best practices February 2015 Executive Summary Knowing that end users are the last line

More information

5 Reasons Why Your Security Education Program isn t Working (and how to fix it)

5 Reasons Why Your Security Education Program isn t Working (and how to fix it) 5 Reasons Why Your Security Education Program isn t Working (and how to fix it) February 2015 Presentation Agenda 5 Reasons Your Program isn t Working 10 Learning Science Principles Continuous Training

More information

Training Employees to Recognise & Avoid Advanced Threats

Training Employees to Recognise & Avoid Advanced Threats Training Employees to Recognise & Avoid Advanced Threats Joe Ferrara, President & CEO, Wombat Security Technologies Rashmi Knowles, Chief Security Architect EMEA, RSA The Security Division of EMC Session

More information

Developing a Successful Security Awareness Training Program. Shea Garber, Sr. Account Executive Wombat Security Technologies, Inc.

Developing a Successful Security Awareness Training Program. Shea Garber, Sr. Account Executive Wombat Security Technologies, Inc. Developing a Successful Security Awareness Training Program Shea Garber, Sr. Account Executive Wombat Security Technologies, Inc. Agenda The human element of cyber security Building your case Building

More information

McAfee Phishing Quiz. Partner Enablement Guide

McAfee Phishing Quiz. Partner Enablement Guide McAfee Phishing Quiz Partner Enablement Guide Use the Phishing Quiz to educate your own organization, prospects, and existing customers about phishing and how McAfee security solutions can help. This guide

More information

Shield Your Business - Combat Phishing Attacks. A Phishnix White Paper

Shield Your Business - Combat Phishing Attacks. A Phishnix White Paper A Phishnix White Paper Shield Your Business - Combat Phishing Attacks Aujas Information Risk Services 19925 Steven s Creek Blvd, Suite 100, Cupertino, CA 95014-2358 Phone: 1.855.PHISHNX Fax : +1 408 973

More information

SPEAR PHISHING AN ENTRY POINT FOR APTS

SPEAR PHISHING AN ENTRY POINT FOR APTS SPEAR PHISHING AN ENTRY POINT FOR APTS threattracksecurity.com 2015 ThreatTrack, Inc. All rights reserved worldwide. INTRODUCTION A number of industry and vendor studies support the fact that spear phishing

More information

THE THREE Es OF MODERN EMAIL SECURITY FOR PHISHING

THE THREE Es OF MODERN EMAIL SECURITY FOR PHISHING THE THREE Es OF MODERN EMAIL SECURITY FOR PHISHING AN ACCUVANT VIEWPOINT By James Robinson, Director, Office of the CISO Attempting to keep up with the ever-changing world of cyber security threats can

More information

Information Security Field Guide to Identifying Phishing and Scams

Information Security Field Guide to Identifying Phishing and Scams Information Security Field Guide to Identifying Phishing and Scams 010001010100101010001010011010101010101010101 01000101010011010010100101001010 1 Contents Introduction Phishing Spear Phishing Scams Reporting

More information

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers. Employee Security Awareness Survey Trenton Bond [email protected] Admin - Version 1.3 Security Awareness One of the most significant security risks that organizations and corporations face today is

More information

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015 The Cost of Phishing Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015 Executive Summary.... 3 The Costs... 4 How To Estimate the Cost of an Attack.... 5 Table

More information

Streamlining Web and Email Security

Streamlining Web and Email Security How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor

More information

Anti-Phishing Best Practices for ISPs and Mailbox Providers

Anti-Phishing Best Practices for ISPs and Mailbox Providers Anti-Phishing Best Practices for ISPs and Mailbox Providers Version 2.01, June 2015 A document jointly produced by the Messaging, Malware and Mobile Anti-Abuse Working Group (M 3 AAWG) and the Anti-Phishing

More information

Social Engineering & How to Counteract Advanced Attacks. Ralph Massaro, VP of Sales Wombat Security Technologies, Inc.

Social Engineering & How to Counteract Advanced Attacks. Ralph Massaro, VP of Sales Wombat Security Technologies, Inc. Social Engineering & How to Counteract Advanced Attacks Ralph Massaro, VP of Sales Wombat Security Technologies, Inc. Agenda Social Engineering DEFCON Competition Source of Problem Countermeasures Social

More information

WHITEPAPER. V12 Group www.v12groupinc.com 141 West Front Street, Suite 410 Red Bank, NJ 07701 [email protected] 1.866.842.1001

WHITEPAPER. V12 Group www.v12groupinc.com 141 West Front Street, Suite 410 Red Bank, NJ 07701 info@v12groupinc.com 1.866.842.1001 WHITEPAPER Phishing Facts for Email Marketers: Understanding the phishing factor impact on your email programs. Email phishing attacks are destructive for everyone, it s not just the brands (and their

More information

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Protect Yourself. Who is asking? What information are they asking for? Why do they need it? Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary

More information

Everyone s online, but not everyone s secure. It s up to you to make sure that your family is.

Everyone s online, but not everyone s secure. It s up to you to make sure that your family is. TrendLabs Everyone s online, but not everyone s secure. It s up to you to make sure that your family is. We live out our digital lives on the Internet. There, communication is quicker and easier, and our

More information

Learn to protect yourself from Identity Theft. First National Bank can help.

Learn to protect yourself from Identity Theft. First National Bank can help. Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone

More information

SPEAR PHISHING UNDERSTANDING THE THREAT

SPEAR PHISHING UNDERSTANDING THE THREAT SPEAR PHISHING UNDERSTANDING THE THREAT SEPTEMBER 2013 Due to an organisation s reliance on email and internet connectivity, there is no guaranteed way to stop a determined intruder from accessing a business

More information

Online Cash Manager Security Guide

Online Cash Manager Security Guide Online Cash Manager Security Guide You re the One who can protect your business from the threat of a Corporate Account Takeover. 102 South Clinton Street Iowa City, IA 52240 1-800-247-4418 Version 1.0

More information

WHITE PAPER. The Cost of Phishing: Understanding the True Cost Dynamics Behind Phishing Attacks

WHITE PAPER. The Cost of Phishing: Understanding the True Cost Dynamics Behind Phishing Attacks WHITE PAPER The Cost of Phishing: Understanding the True Cost Dynamics Behind Phishing Attacks A Cyveillance Report October 2008 EXECUTIVE SUMMARY How much do phishing attacks really cost organizations?

More information

TEN COMMANDMENTS OF EFFECTIVE SECURITY AWARENESS TRAINING

TEN COMMANDMENTS OF EFFECTIVE SECURITY AWARENESS TRAINING Ralph Massaro VP of Operations TEN COMMANDMENTS OF EFFECTIVE SECURITY AWARENESS TRAINING 10/26/2012 1 Humans - The Weakest Link? 82% of large organizations had staff driven security breaches(1) 47% had

More information

SANS Securing The Human

SANS Securing The Human SANS Securing The Human Introduction Most organizations have invested in security technology to protect their information, putting in place solutions such as firewalls, encryption or IDS sensors. However,

More information

Cyber Security. Securing Your Mobile and Online Banking Transactions

Cyber Security. Securing Your Mobile and Online Banking Transactions Cyber Security Securing Your Mobile and Online Banking Transactions For additional copies or to download this document, please visit: http://msisac.cisecurity.org/resources/guides 2014 Center for Internet

More information

Security Intelligence Services. Cybersecurity training. www.kaspersky.com

Security Intelligence Services. Cybersecurity training. www.kaspersky.com Kaspersky Security Intelligence Services. Cybersecurity training www.kaspersky.com CYBERSECURITY TRAINING Leverage Kaspersky Lab s cybersecurity knowledge, experience and intelligence through these innovative

More information

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft

More information

DON T BE FOOLED BY EMAIL SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam E-Mail FREE GUIDE. December 2014 Oliver James Enterprise

DON T BE FOOLED BY EMAIL SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam E-Mail FREE GUIDE. December 2014 Oliver James Enterprise Provided by: December 2014 Oliver James Enterprise DON T BE FOOLED BY EMAIL SPAM FREE GUIDE 1 This guide will teach you: How to spot fraudulent and spam e-mails How spammers obtain your email address How

More information

Phishing. Foiled. Over just a few weeks, I received e-mail. Can

Phishing. Foiled. Over just a few weeks, I received e-mail. Can computer security Can Phishing Understanding the human factors that make people vulnerable to online criminals can improve both security training and technology By Lorrie Faith Cranor? Be Foiled KEY CONCEPTS

More information

Intercept Anti-Spam Quick Start Guide

Intercept Anti-Spam Quick Start Guide Intercept Anti-Spam Quick Start Guide Software Version: 6.5.2 Date: 5/24/07 PREFACE...3 PRODUCT DOCUMENTATION...3 CONVENTIONS...3 CONTACTING TECHNICAL SUPPORT...4 COPYRIGHT INFORMATION...4 OVERVIEW...5

More information

Cyber Security Breakout Session. Ed Rosenberg, Vice President & Chief Security Officer, BMO Financial Group Legal, Corporate & Compliance Group

Cyber Security Breakout Session. Ed Rosenberg, Vice President & Chief Security Officer, BMO Financial Group Legal, Corporate & Compliance Group Cyber Security Breakout Session Ed Rosenberg, Vice President & Chief Security Officer, BMO Financial Group Legal, Corporate & Compliance Group December 2014 Disclaimer: The material in this presentation

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

Chapter 1: What s new in Adobe Connect 9

Chapter 1: What s new in Adobe Connect 9 1 Chapter 1: Adobe Connect is a web conferencing solution for web meetings, e-learning, and webinars. It powers mission critical web conferencing solutions end-to-end, on virtually any device, hence boosting

More information

Course Title: Penetration Testing: Network & Perimeter Testing

Course Title: Penetration Testing: Network & Perimeter Testing Course Title: Penetration Testing: Network & Perimeter Testing Page 1 of 7 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics

More information

Internet threats: steps to security for your small business

Internet threats: steps to security for your small business Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential

More information

CSUF Tech Day 2015. Security Awareness Overview Dale Coddington, Information Security Office [email protected]

CSUF Tech Day 2015. Security Awareness Overview Dale Coddington, Information Security Office dcoddington@fullerton.edu CSUF Tech Day 2015 Security Awareness Overview Dale Coddington, Information Security Office [email protected] Agenda Introduction Large scale data breaches: 2014 and beyond Email based attacks:

More information

BE SAFE ONLINE: Lesson Plan

BE SAFE ONLINE: Lesson Plan BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take

More information

Evaluating DMARC Effectiveness for the Financial Services Industry

Evaluating DMARC Effectiveness for the Financial Services Industry Evaluating DMARC Effectiveness for the Financial Services Industry by Robert Holmes General Manager, Email Fraud Protection Return Path Executive Summary Email spoofing steadily increases annually. DMARC

More information

SEC-GDL-005-Anatomy of a Phishing Email

SEC-GDL-005-Anatomy of a Phishing Email Technology & Information Services SEC-GDL-005-Anatomy of a Phishing Email Author: Paul Ferrier Date: 07/11/2014 Document Security Level: Document Version: PUBLIC 0.98 Document Ref: SEC-GDL-005 Document

More information

Comprehensive real-time protection against Advanced Threats and data theft

Comprehensive real-time protection against Advanced Threats and data theft TRITON AP-WEB Comprehensive real-time protection against Advanced Threats and data theft Your business and its data are under constant attack. Traditional security solutions no longer provide sufficient

More information

5 tips to improve your email database. An Experian Data Quality white paper

5 tips to improve your email database. An Experian Data Quality white paper 5 tips to improve your email database An Experian Data Quality white paper While many marketers spend significant time and effort optimizing content and debating the timing of each campaign, marketers

More information

WEB PROTECTION. Features SECURITY OF INFORMATION TECHNOLOGIES

WEB PROTECTION. Features SECURITY OF INFORMATION TECHNOLOGIES WEB PROTECTION Features SECURITY OF INFORMATION TECHNOLOGIES The web today has become an indispensable tool for running a business, and is as such a favorite attack vector for hackers. Injecting malicious

More information

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth Modern Cyber Threats how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure Axel Wirth Healthcare Solutions Architect Distinguished Systems Engineer AAMI 2013 Conference

More information

Microsoft Office Small Business 2007

Microsoft Office Small Business 2007 Microsoft Office Small Business 2007 Microsoft Office Small Business 2007 provides you with a complete set of productivity and contact management tools to accomplish routine tasks quickly, manage customer

More information

SECURITY AWARENESS TRAINING. July 2015

SECURITY AWARENESS TRAINING. July 2015 SECURITY AWARENESS TRAINING July 2015 Agenda Overview Modules Supporting Collateral Customization/Language Options Consumption Models Administration and Reporting Confidential and Proprietary 2 Information

More information

DETECT MONITORING SERVICES MITIGATING THE EPSILON EMAIL BREACH SUMMARY

DETECT MONITORING SERVICES MITIGATING THE EPSILON EMAIL BREACH SUMMARY DETECT MONITORING SERVICES MITIGATING THE EPSILON EMAIL BREACH SUMMARY The April 1st statement released by the marketing firm Epsilon has turned out to be no April Fools Day joke. Sophisticated and targeted

More information

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. [email protected]

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library [email protected] Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup

More information

Defending Against. Phishing Attacks

Defending Against. Phishing Attacks Defending Against Today s Targeted Phishing Attacks DeFending Against today s targeted phishing attacks 2 Introduction Is this email a phish or is it legitimate? That s the question that employees and

More information

Sophistication of attacks will keep improving, especially APT and zero-day exploits

Sophistication of attacks will keep improving, especially APT and zero-day exploits FAQ Isla Q&A General What is Isla? Isla is an innovative, enterprise-class web malware isolation system that prevents all browser-borne malware from penetrating corporate networks and infecting endpoint

More information

Module 1: Introduction to Designing Security

Module 1: Introduction to Designing Security Module 1: Introduction to Designing Security Table of Contents Module Overview 1-1 Lesson 1: Overview of Designing Security for Microsoft Networks 1-2 Lesson 2: Introducing Contoso Pharmaceuticals: A Case

More information

A new fake Citibank phishing scam using advanced techniques to manipulate users into surrendering online banking access has emerged.

A new fake Citibank phishing scam using advanced techniques to manipulate users into surrendering online banking access has emerged. A new fake Citibank phishing scam using advanced techniques to manipulate users into surrendering online banking access has emerged. The Citibank scam tricks users into surrendering their online banking

More information

Attack Intelligence: Why It Matters

Attack Intelligence: Why It Matters Attack Intelligence: Why It Matters WHITE PAPER Core Security +1 617.399-6980 [email protected] www.coresecurity.com A Proactive Strategy Attacks against your organization are more prevalent than ever,

More information

Web Protection for Your Business, Customers and Data

Web Protection for Your Business, Customers and Data WHITE PAPER: WEB PROTECTION FOR YOUR BUSINESS, CUSTOMERS............ AND.... DATA........................ Web Protection for Your Business, Customers and Data Who should read this paper For security decision

More information

ENABLING FAST RESPONSES THREAT MONITORING

ENABLING FAST RESPONSES THREAT MONITORING ENABLING FAST RESPONSES TO Security INCIDENTS WITH THREAT MONITORING Executive Summary As threats evolve and the effectiveness of signaturebased web security declines, IT departments need to play a bigger,

More information

Retail/Consumer Client. Internet Banking Awareness and Education Program

Retail/Consumer Client. Internet Banking Awareness and Education Program Retail/Consumer Client Internet Banking Awareness and Education Program Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 E-mail Risk... 3 Internet

More information

THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer.

THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer. THE 2014 THREAT DETECTION CHECKLIST Six ways to tell a criminal from a customer. Telling criminals from customers online isn t getting any easier. Attackers target the entire online user lifecycle from

More information

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer

More information

SOMETHING PHISHY IS GOING ON!

SOMETHING PHISHY IS GOING ON! SOMETHING PHISHY IS GOING ON! Engaging, easy to understand, memorable training. WHAT WE DO We have created a series of training episodes that are highly engaging, easy to understand and memorable. They

More information

Information Security Awareness Training

Information Security Awareness Training Information Security Awareness Training Various Methods and their effectiveness at New Paltz SUNY Technology Conference Lake Placid - June 2014 Paul Chauvet Why the focus on training? Only amateurs attack

More information

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction

More information

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer

More information

Computer Security Maintenance Information and Self-Check Activities

Computer Security Maintenance Information and Self-Check Activities Computer Security Maintenance Information and Self-Check Activities Overview Unlike what many people think, computers are not designed to be maintenance free. Just like cars they need routine maintenance.

More information

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security Web Security Gateway Web Security Web Filter Express Hosted Web Security Web Security Solutions The Approach In the past, most Web content was static and predictable. But today s reality is that Web content

More information

CSSEA Helpdesk User Guide

CSSEA Helpdesk User Guide CSSEA Helpdesk User Guide Contents I. Creating tickets... 3 1. Creating a New Ticket via Email... 3 a. Email format... 3 b. New ticket reply... 3 2. Creating a New ticket via the Website... 4 a. Browse

More information

Fighting Advanced Threats

Fighting Advanced Threats Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.

More information

Web Application Attacks and Countermeasures: Case Studies from Financial Systems

Web Application Attacks and Countermeasures: Case Studies from Financial Systems Web Application Attacks and Countermeasures: Case Studies from Financial Systems Dr. Michael Liu, CISSP, Senior Application Security Consultant, HSBC Inc Overview Information Security Briefing Web Applications

More information

SOMEBODY'S WATCHING YOU! Maritime Cyber Security White Paper. Safeguarding data through increased awareness

SOMEBODY'S WATCHING YOU! Maritime Cyber Security White Paper. Safeguarding data through increased awareness SOMEBODY'S WATCHING YOU! Maritime Cyber Security White Paper Safeguarding data through increased awareness November 2015 1 Contents Executive Summary 3 Introduction 4 Martime Security 5 Perimeters Breached

More information

How To Protect Your Online Banking From Fraud

How To Protect Your Online Banking From Fraud DETECT MONITORING SERVICES AND DETECT SAFE BROWSING: Empowering Tools to Prevent Account Takeovers SUMMARY The Federal Financial Institutions Examination Council (FFIEC) is planning to update online transaction

More information

Version Comparison. Maximizer CRM 12 Winter Version Comparison Chart. Performance, Usability, Simplicity Enhanced

Version Comparison. Maximizer CRM 12 Winter Version Comparison Chart. Performance, Usability, Simplicity Enhanced Maximizer CRM 12 Winter Version Comparison Chart Performance, Usability, Simplicity Enhanced The Winter release of Maximizer CRM 12 continues to build on the theme of enhanced performance, usability and

More information

AT&T Mobile Barcode Services

AT&T Mobile Barcode Services Product Brief AT&T Mobile Barcode Services Managed Experience at the Moment of Interest. Traditional media represents the vast majority of today s total advertising spend. However, print, TV, point of

More information

Feature Guide. Want to talk it through? pure360.com call: 0844 586 0001 email: [email protected]. Work With Data. Work With Messages

Feature Guide. Want to talk it through? pure360.com call: 0844 586 0001 email: contact@pure360.com. Work With Data. Work With Messages ro Work With Data Import, append & export unlimited lists - with no restrictions on number of contacts De-duplication and list cleaning Dedupe of lists on upload, clean bounces Automatic bounce, opt-out

More information

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it? LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams

More information

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security Web Security Gateway Web Security Web Filter Hosted Web Security Web Security Solutions The Approach In the past, most Web content was static and predictable. But today s reality is that Web content even

More information

Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives

Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives Estimated time: 45 minutes Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives Overview: Students learn strategies for guarding against

More information

How to Recognize Phishing Emails Targeting the University of Mary

How to Recognize Phishing Emails Targeting the University of Mary How to Recognize Phishing Emails Targeting the University of Mary For the past several years, University of Mary has been targeted by phishing emails. It is important that you recognize these scams so

More information

Continuous Penetration Testing

Continuous Penetration Testing Continuous Penetration Testing SyCom Technologies 1.0 Continuous Penetration Testing Imagine a service that continuously monitors and reports on any new threats that emerge real time and provides a tactical

More information