Anti-Phishing Training Modules Teach employees to recognize and avoid phishing and spear phishing attacks



Similar documents
SIMULATED ATTACKS. Evaluate Susceptibility Using PhishGuru, SmishGuru, and USBGuru MEASURE ASSESS

5 Reasons Why Your Security Education Program isn t Working (and how to fix it)

Deploying Continuous and Measurable Security Education for Employees. Security awareness and training methodology and best practices

Deploying Continuous and Measurable Security Education for Employees. Security awareness and training methodology and best practices

5 Reasons Why Your Security Education Program isn t Working (and how to fix it)

Training Employees to Recognise & Avoid Advanced Threats

Developing a Successful Security Awareness Training Program. Shea Garber, Sr. Account Executive Wombat Security Technologies, Inc.

McAfee Phishing Quiz. Partner Enablement Guide

Shield Your Business - Combat Phishing Attacks. A Phishnix White Paper

SPEAR PHISHING AN ENTRY POINT FOR APTS

THE THREE Es OF MODERN SECURITY FOR PHISHING

Information Security Field Guide to Identifying Phishing and Scams

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015

Streamlining Web and Security

Anti-Phishing Best Practices for ISPs and Mailbox Providers

Social Engineering & How to Counteract Advanced Attacks. Ralph Massaro, VP of Sales Wombat Security Technologies, Inc.

WHITEPAPER. V12 Group West Front Street, Suite 410 Red Bank, NJ

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Everyone s online, but not everyone s secure. It s up to you to make sure that your family is.

Learn to protect yourself from Identity Theft. First National Bank can help.

SPEAR PHISHING UNDERSTANDING THE THREAT

Online Cash Manager Security Guide

WHITE PAPER. The Cost of Phishing: Understanding the True Cost Dynamics Behind Phishing Attacks

TEN COMMANDMENTS OF EFFECTIVE SECURITY AWARENESS TRAINING

SANS Securing The Human

Cyber Security. Securing Your Mobile and Online Banking Transactions

Security Intelligence Services. Cybersecurity training.

1. Any requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

DON T BE FOOLED BY SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam FREE GUIDE. December 2014 Oliver James Enterprise

Phishing. Foiled. Over just a few weeks, I received . Can

Intercept Anti-Spam Quick Start Guide

Cyber Security Breakout Session. Ed Rosenberg, Vice President & Chief Security Officer, BMO Financial Group Legal, Corporate & Compliance Group

National Cyber Security Month 2015: Daily Security Awareness Tips

Chapter 1: What s new in Adobe Connect 9

Course Title: Penetration Testing: Network & Perimeter Testing

Internet threats: steps to security for your small business

CSUF Tech Day Security Awareness Overview Dale Coddington, Information Security Office

BE SAFE ONLINE: Lesson Plan

Evaluating DMARC Effectiveness for the Financial Services Industry

SEC-GDL-005-Anatomy of a Phishing

Comprehensive real-time protection against Advanced Threats and data theft

5 tips to improve your database. An Experian Data Quality white paper

WEB PROTECTION. Features SECURITY OF INFORMATION TECHNOLOGIES

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Microsoft Office Small Business 2007

SECURITY AWARENESS TRAINING. July 2015

DETECT MONITORING SERVICES MITIGATING THE EPSILON BREACH SUMMARY

INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

Defending Against. Phishing Attacks

Sophistication of attacks will keep improving, especially APT and zero-day exploits

Module 1: Introduction to Designing Security

A new fake Citibank phishing scam using advanced techniques to manipulate users into surrendering online banking access has emerged.

Attack Intelligence: Why It Matters

Web Protection for Your Business, Customers and Data

ENABLING FAST RESPONSES THREAT MONITORING

Retail/Consumer Client. Internet Banking Awareness and Education Program

THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer.

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

SOMETHING PHISHY IS GOING ON!

Information Security Awareness Training

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Computer Security Maintenance Information and Self-Check Activities

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security

CSSEA Helpdesk User Guide

Fighting Advanced Threats

Web Application Attacks and Countermeasures: Case Studies from Financial Systems

SOMEBODY'S WATCHING YOU! Maritime Cyber Security White Paper. Safeguarding data through increased awareness

How To Protect Your Online Banking From Fraud

Version Comparison. Maximizer CRM 12 Winter Version Comparison Chart. Performance, Usability, Simplicity Enhanced

AT&T Mobile Barcode Services

Feature Guide. Want to talk it through? pure360.com call: Work With Data. Work With Messages

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security

Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives

How to Recognize Phishing s Targeting the University of Mary

Continuous Penetration Testing

Transcription:

Anti-Phishing Training Modules Teach employees to recognize and avoid phishing and spear phishing attacks Improve Phishing Knowledge and Reduce Susceptibility to Attack Do you already have some form of security awareness training? Do you know if it is effective? Don t you want to keep improving it? Phishing attacks are getting better every day. Are your users prepared? Minutes of our training can reduce your employee s susceptibility to falling for a phishing attack by over 50%. Wombat can help. We offer the most effective and comprehensive anti-phishing training suite in the market. In addition to our mock phishing attack service, PhishGuru we also offer three different anti-phishing training modules, Anti-Phishing Phil, a training game for identifying malicious URLs, Anti-Phishing Phyllis, an anti-phishing email training game, and Email Security, an interactive anti-phishing email training module. Both Anti-Phishing Phyllis and Email Security software-based training products, teach users to spot phishing traps in emails, such as fake links, malicious attachments, cash prizes, reply-to emails asking for sensitive information and much more. Each takes just over 5 minutes to complete and includes an extensive collection of randomized legitimate and fraudulent emails with key areas highlighted. Users are asked to identify if the highlighted areas are security traps or safe areas in the email. The moment after the user makes a decision, they receive immediate feedback for both correct and incorrect answers. We call this moment a teachable moment, a situation when the user is most open to learning and concepts taught are retained for longer periods of time. Wombat s approach of applying learning science principles to software-based training to teach employees how to recognize and avoid phishing attacks, does more than just check the box on security awareness training, it creates behavior change. Anti-Phishing Phyllis Email Security

Anti-Phishing Training Modules Teach employees to recognize and avoid phishing and spear phishing attacks We have developed these two different training products, Anti-Phishing Phyllis and Email Security on the same topic so that security officers and administrators can select the teaching style that best suits their organization s culture. Both modules teach the same concepts just in different ways. Anti-Phishing Phyllis and Email Security training products are just one part of the Wombat Security Training Platform that enables security officers to assess employees, deliver training, track results, and gain a comprehensive view of their cyber security posture. The platform provides detailed reports that show aggregate and individual data which can be used to develop follow-up training programs and show user knowledge gained over time. Wombat Core Features and Benefits Engaging and interactive training increases end user participation Learning science principles ensure users learn by doing and retain content much longer Short training modules are focused and respectful of busy schedules Collect valuable data about individual and organizational vulnerability to attack Cost effective - likely to cost less than your current training SCORM compliant to enable integration with your LMS 508-compliant to support people with learning, visual, hearing and physical disabilities Assessment Simulated Phishing Attacks Training Safe Browsing - NEW Security Beyond the Office - NEW Smartphone Security Safe Social Networks Phishing Traps Social Engineering Mobility and Travel Malicious URL Training Password Security Email Security Reporting Completion Data Average Score Most Missed Items User Activity Contact us today for a demonstration of our complete suite of anti-phishing assessment and training products. 4620 Henry Street, Third Floor Pittsburgh, PA 15213 Wombat Security Technologies, Inc. All rights reserved. Wombat Security Technologies name, logo, PhishPatrol and PhishGuru are all trademarks of Wombat Security Technologies, Inc.

PhishGuru Phishing Attack Simulation Service Assess vulnerability and teach employees not to click Reduce your susceptibility by up to 70% Phishing Your Employees: Criminals are Doing It Right Now Every day new phishing emails are reaching your employees inboxes and, as a security officer, you are constantly wondering when someone will click, or reply, and expose the company s network and intellectual property. What if you could send your employees phishing emails to train them, and what if every person who falls for the phishing email is immediately trained what not to do the next time? PhishGuru, a software-as-a-service product, is an easy-to-use tool that assesses and trains employees with simulated phishing emails. This creates a unique teachable moment when employees fall for the simulated attack and are open to learning. Just-in-time training explains what they did wrong and how to avoid it the next time. PhishGuru is not a penetration test, it s much more. It s a way to change behavior. Campaign 1 Campaign 2 Campaign 3 0 10 20 30 40 viewed email and clicked on link Capturing Valuable Security Posture Intelligence Not only are employees being trained, but valuable data is being captured. The intelligence gathered from the mock attacks such as which attacks your organization is most susceptible to, which people are vulnerable, what devices they were using, and how people have changed their behavior after just one mock attack is available instantly. This intelligence can be used to understand your organization s security posture and assign targeted training to the people who need it most. NEW! Our multi-panel training references the specific mock phishing attack that you send, showing users point by point what they did wrong.

PhishGuru Phishing Attack Simulation Service Assess vulnerability and teach employees not to click NEW! Customizable Emails and Training to Meet Your Unique Needs Send a phishing email from a number of templates or craft your own Select the training method that suits your organization in terms of style and content Create your own training from our templates using a simple WYSIWYG editor You can edit all content in our training to fit your unique needs. The Wombat Security Training Platform The PhishGuru service is just one of the security awareness tools available in the Wombat Security Training Platform that enables security professionals and administrators to assess employees, deliver training, track results, and improve their cyber security posture. Reporting capabilities in the Platform provide both aggregate and individual data to guide follow-up training programs and show improved results over time. Wombat Core Features and Benefits Engaging and interactive training increases end user participation Learning-science principles ensure users learn key concepts and retain content much longer Short training modules are focused and respectful of busy schedules Training modules based upon scientific research in cyber security and learning science Cost effective likely to cost less than your current training SCORM compliant to enable integration with your Learning Management System (LMS) 508-compliant to support people with learning, visual, hearing and physical disabilities Assessment Phishing Attack Simulation Training Safe Browsing NEW Security Beyond the Office NEW Smartphone Security Social Network Safety Phishing Traps Social Engineering Mobility and Travel Malicious URL Training Password Security Email Security Reporting Completion Data Average Score Most Missed Items User Activity Combine PhishGuru with Wombat s anti-phishing training modules, for the most comprehensive anti-phishing training available today. 4620 Henry Street, Third Floor Pittsburgh, PA 15213 Wombat Security Technologies, Inc. All rights reserved. Wombat Security Technologies name, logo, PhishPatrol and PhishGuru are all trademarks of Wombat Security Technologies, Inc.

Anti-Phishing Phil Training Game Teaches Employees How to Identify Malicious URLs 10-minutes of training can reduce the chance of your employee falling for a phishing attack by over 50% compared to traditional training methods! To drive lasting change in employee behavior, cyber security training must be engaging, efficient and effective. who had played the game to distinguish legitimate URLs from fraudulent ones improved nearly twice as much as that of those trained with standard materials. Like Wombat s other products, Anti-Phishing Phil offers extensive reporting functionality to enable security professionals to track the performance of users and target training appropriately. Classroom training lectures are ineffective; online video training doesn t work. Static cyber security training emails don t work. What works to reduce the number of people clicking on dangerous URLS? Wombat s Anti-Phishing Phil training game does! Developed using learning science principles, Anti- Phishing Phil is a SCORM-compliant computer security training game that teaches employees and customers to recognize fraudulent URLs. In just 10 minutes of play, the user makes decisions on the safety of 32 different URLs links. When employees make a mistake they learn why immediately. The latest release of the product incorporates a number of recent phishing attacks and the links used in the attacks. The game can also be customized to incorporate attacks that companies have seen themselves to ensure that employees are prepared. The ability of subjects who had played the game to distinguish legitimate URLs from fraudulent ones improved nearly twice as much as that of those trained with standard materials. - Scientific American Best of all, Anti-Phishing Phil training makes a lasting impact. According to the Scientific American article How to Foil Phishing Scams, which featured Anti-Phishing Phil, the ability of subjects You can deploy Anti-Phishing Phil on your intranet. You can also choose to customize the game by licensing a version with your organization s branding and specific URLs. A 508-compliant version is also available. Contact us to learn more about how we make a lasting change to employee behavior with Anti- Phishing Phil. info@wombatsecurity.com About Wombat Security Technologies With millions of users across North America, Europe, and Asia, Wombat Security Technologies is a global leader in cyber security awareness training and also offers unique anti-phishing filtering solutions. Wombat s products have been licensed for use in sectors as diverse as finance, government, insurance, healthcare, energy, e-tailing, logistics and education to name just a few.