Protect yourself from phishing
Do you have control over incoming phishing attacks in your company?
Now you can train all your employees on how to spot and avoid being phished.
Description of the project
- Train your business to protect itself against the latest phishing and ransomware threats.
- If you’re the only one who knows your password, we know and want to help you!
- Protect yourself against social engineering, spear phishing and ransomware. It’s easy!
Did you know that
- 95% of all security breaches are possible due to the human factor
- The total revenue/cost of IT fraud will reach $6 trillion in 2021.
- Since the Covid outbreak, reported ‘cybercrimes’ have increased by 300%.
- 43% of cyberattacks try to target ‘small business’
The service includes the following:
“Fake” Attacks
- Various forms of “fake” attacks to test user behavior
- Can be done before announcing the start of a training program to get an overview of the current situation
- Can then be done every now and then to see if users are improving or not
- If a user “makes a mistake”, they are taken to a customized training site and given tips on what training they should go through to become more aware of different risks/threats
Training courses
- There is a range of training available to users, with a mix of training videos and other materials, and some ending with a test to check whether the user has learned what has been covered.
- The training material is available in a number of languages, including Swedish.
- There are both general trainings and niche trainings for e.g. “C-level” etc. where some of the threats that occur are more targeted at certain types of more vulnerable roles
- The training components range from “how to check that an email is correct”, “how to think about passwords”, “how to behave on social media”, “what should I think about when surfing”.
Our service:
- The service is fully web-based and requires no investment to operate.
- We set up the solution for you, conduct a first “attack” to get a baseline / current situation analysis and then start up a training package for the selected users.
- The trainings run continuously throughout the year divided into modules.
- New attacks are launched at irregular intervals to see if there is an improvement.
- Reports are included where you can follow the progress of the trainings and the outcome of the attacks.
- CoreIT is responsible for following up the reports with you and going through suggestions on how your routines and processes can be improved and if there are also changes to be introduced in the IT environment to protect users and the company even more.
Want to know more?
We help you find the best solution. Get in touch with us and we’ll tell you more!