Broad-scale and targeted email phishing attacks are among the most likely type of cyber attack that businesses are having to contend with today. Such emails can be sent with little risk, and if successful, could trick users into revealing sensitive information such as login credentials, or potentially even result in the installation of malware. Such emails could be sent in mass to all employees when just one successful exploit is needed to compromise the business’ sensitive data. Alternatively, specific individuals within the business may be targeted with highly bespoke emails, aiming to leverage that particular employee’s privileges.
Get a Quote
Methodology
Our experts will listen to you and your needs to develop a tailored testing strategy. From here our consultants will use a wide variety of penetration testing tools and resources to gather information on your organisation.
Now the test is complete our consultants will fill out a detailed report of their findings, broken down by category and type, adding any remediation advice to the exploits and vulnerabilities they discovered. This data will be accessible via SecurePortal and follow up calls will be made to walkthrough the test and the steps required to remove the risks found.
Through the gathering of business OSINT, and discussions with the client, appropriate scenarios are designed. These scenarios will assess the business’ procedures and effectiveness of awareness training.
SecurePortal provides clients with a new way to monitor and analyse the data you receive in your penetration tests. Rather than a lengthy physical report you gain a range of simple features that highlight your test findings and vulnerabilities.
Easily access remediation advice from our team of consultants on discovered vulnerabilities and assign them to your team for fast and efficient resolution. Receive overview and trend data of all of the current security issues you face in your organisatio and so much more./
Understand the security risks associated with phishing scams through a thorough assessment to highlight training areas to focus on.
Many organisations require an email phishing scenario as part of employee awareness training. Pentest People are experienced in this form of attack and our consultants use it daily during other Penetration Testing Services.
Chose between either a broad-scale generic email phishing attack or a realistic targeted attack on key employees.
Email Phishing is the most widely used form of cyber attack businesses have to contend with.
Testing Made Simple.
Until now, the traditional deliverable from a Penetration Test engagement has been a lengthy 100+ page PDF report. Pentest People have developed a solution to this issue where you interact with your vulnerabilities within the SecurePortal.
Constantly updating Vulnerability Information to stay in touch with the emerging threat landscape. Receive overview and trend data of all of the current security issues you face in your organisation. All viewable on an interactive dashboard.
Assign your remediation steps via SecurePortal and monitor their progress. Saving you time and resources.
Email Phishing attacks are becoming more predominant in every industry. It’s one of the most universal types of cyberattack and can be used to gain easy access to a businesses network.
Businesses have to make employees aware of such phishing attempts, that can be both broad-scale and targeted (most likely on more high ranking employees). The Pentest People Phishing Assessment is the perfect solution for training your team and finding the weaknesses in your employees awareness.
Pentest People can help alleviate the risks associated with Email Phishing by performing either a broad-scale or targeted phishing scenario.
Pentest People have a professional Phishing Service that can be used to identify flaws that exist within your team in regard to their email phishing awareness. From this phishing test service assessment you can create professional training protocol so your employees never fall victim to such attacks.
The service would be delivered as part of the Pentest People Penetration Testing as a Service (PTaaS) and full access to the SecurePortal and other complementary tools would be provided.
Experienced Consultant Team
Penetration testing is a key component of any effective cybersecurity strategy, and it requires well-trained professionals to execute. Our consultant team needs are highly trained in order to test your business for vulnerabilities and identify potential threats before they cause harm. Our team have a deep understanding of the systems and protocols involved in protecting against hackers, malware, and data breaches.
Need More Info on Our Infrastructure Testing?
The aim of a phishing campaign is to target staff members by simulating a realistic phishing attack and analysing the response from staff members. This allows companies to understand how likely they are to be compromised by a phishing attack and identify key areas/people that may require additional security awareness training. Regular phishing campaigns allow you to track the progress your security awareness training over time.
Two-thirds of all malware arrives via email attachments and sophisticated phishing emails facilitate 90% of successful cyber attacks. According to trend labs, the average cost of a business email compromise attack is $140,000 but this can be more significant with Leoni AG losing $44.6 million in a single attack. Between 2013 and 2018, over $12 billion was lost to phishing attacks.
Pentest People offer a broad range of phishing services that can be completely tailored to suit your needs. Typically, a login portal of some kind will be spoofed with code that will gather credentials entered on the page. At this point, we can stop the campaign or as companies often want, we can dig further and try to access systems like office365. Phishing is often executed as part of a larger Social Engineering package that consists of Open Source Intelligence Gathering (OSINT), Telephone phishing and physical intrusion. It can be sold as a single service.
All sized companies can benefit from a phishing assessment. A lot of time and money is spent hardening Infrastructures and Web Applications but ‘people’ are often overlooked even though they are typically the easiest way for an attacker to breach an organisation.