ClickCease ..... ..... .....
..... ..... .....
...... ......

Phishing Email Assessment

Assess the security of your remote working solution, ensuring that configuration issues are

not exposing your corporate data and systems to unauthorised users.

Enquire

No items found.
No items found.

What is a Phishing Assessment & Why Does My Business Need One?

Broad-scale and targeted email phishing attacks are among the most likely type of cyber attack that businesses are having to contend with today. Such emails can be sent with little risk, and if successful, could trick users into revealing sensitive information such as login credentials, or potentially even result in the installation of malware. Such emails could be sent in mass to all employees when just one successful exploit is needed to compromise the business’ sensitive data. Alternatively, specific individuals within the business may be targeted with highly bespoke emails, aiming to leverage that particular employee’s privileges.

No items found.

Get a Quote

Answer a Few Questions & Get a Quote Straight to Your Email

No items found.
No items found.

No items found.

Methodology

Overview of our Email Phishing Security Service Methodology

DarkInvader Lock 2

Scoping & Intelligence Gathering

Our experts will listen to you and your needs to develop a tailored testing strategy. From here our consultants will use a wide variety of penetration testing tools and resources to gather information on your organisation.

DarkInvader Lock 2

Reporting & Remediation

Now the test is complete our consultants will fill out a detailed report of their findings, broken down by category and type, adding any remediation advice to the exploits and vulnerabilities they discovered. This data will be accessible via SecurePortal and follow up calls will be made to walkthrough the test and the steps required to remove the risks found.

DarkInvader Lock 2

Targeted Scenarios

Through the gathering of business OSINT, and discussions with the client, appropriate scenarios are designed. These scenarios will assess the business’ procedures and effectiveness of awareness training.

DarkInvader Lock 2

Bespoke Fake Portals

Pentest People use proprietary software to automate the sending of emails, tracking of responses, and hosting of fake login portals. As such, bespoke portals can be built from scratch to perfectly match any the client may have. These portals are then used to capture the credentials of users.

DarkInvader Lock 2

Tracked Emails and Responses

Emails sent are embedded with information unique to the target user, allowing Pentest People to track which users clicked links, submitted credentials, the times of all events, and will cross-reference this information with departments and/or locations to build useful statistics.

DarkInvader Lock 2

Awareness Training

The results of the phishing assessment are then used to provide recommendations for awareness training areas of focus.

No items found.

Make Your Testing Experience Easier with SecurePortal

SecurePortal provides clients with a new way to monitor and analyse the data you receive in your penetration tests. Rather than a lengthy physical report you gain a range of simple features that highlight your test findings and vulnerabilities.

Easily access remediation advice from our team of consultants on discovered vulnerabilities and assign them to your team for fast and efficient resolution. Receive overview and trend data of all of the current security issues you face in your organisatio and so much more./

Learn More

Key Benefits of a Phishing Assessment

Understand the security risks associated with phishing scams through a thorough assessment to highlight training areas to focus on.

green tick

Many organisations require an email phishing scenario as part of employee awareness training. Pentest People are experienced in this form of attack and our consultants use it daily during other Penetration Testing Services.

green tick

Chose between either a broad-scale generic email phishing attack or a realistic targeted attack on key employees.

green tick

Email Phishing is the most widely used form of cyber attack businesses have to contend with.

Testing Made Simple.

The Phishing Email Assessment Provides Access to SecurePortal

Digital Report

Until now, the traditional deliverable from a Penetration Test engagement has been a lengthy 100+ page PDF report. Pentest People have developed a solution to this issue where you interact with your vulnerabilities within the SecurePortal.

Vulnerability Data

Constantly updating Vulnerability Information to stay in touch with the emerging threat landscape. Receive overview and trend data of all of the current security issues you face in your organisation. All viewable on an interactive dashboard.

Assign Remediation Steps

Assign your remediation steps via SecurePortal and monitor their progress. Saving you time and resources.

What Are The Risks Involved With Phishing?

Email Phishing attacks are becoming more predominant in every industry. It’s one of the most universal types of cyberattack and can be used to gain easy access to a businesses network.

Businesses have to make employees aware of such phishing attempts, that can be both broad-scale and targeted (most likely on more high ranking employees). The Pentest People Phishing Assessment is the perfect solution for training your team and finding the weaknesses in your employees awareness.

How Can Our Phishing Assessment Service Help?

Pentest People can help alleviate the risks associated with Email Phishing by performing either a broad-scale or targeted phishing scenario.

Pentest People have a professional Phishing Service that can be used to identify flaws that exist within your team in regard to their email phishing awareness. From this phishing test service assessment you can create professional training protocol so your employees never fall victim to such attacks.

The service would be delivered as part of the Pentest People Penetration Testing as a Service (PTaaS) and full access to the SecurePortal and other complementary tools would be provided.

Experienced Consultant Team

Our Testing Team are CREST Accredited & Includes CHECK Team Leaders

Experienced & Accredited Testing Team For All Our Services

Penetration testing is a key component of any effective cybersecurity strategy, and it requires well-trained professionals to execute. Our consultant team needs are highly trained in order to test your business for vulnerabilities and identify potential threats before they cause harm. Our team have a deep understanding of the systems and protocols involved in protecting against hackers, malware, and data breaches.

  • CHECK Team Leaders
  • CREST Accredited consultant teams
  • Experts in all areas of cybersecurity

See What Our Clients Have to Say About our Professional Services

Pentest People stand out in the field of penetration testing due to the skillset of people they have working there. We undertook a complex bespoke pentest with them which required a lot of pre-work in order to make sure it was scoped correctly and they took the time to come onsite to make sure all was correct prior to commencing. From my experience with them, they are very intelligent people with a deep understanding of the security landscape and we will continue to use them for future testing requirements”.

Interactive Investors
Information Security Manager

"Pentest People has been a trusted partner in our Information Security audits, helping us achieve ISO27001:2013 and Cyber Essentials certifications. Their expertise, professionalism, and
customer-focused solutions have greatly improved our ICT infrastructure.

I highly recommend Pentest People to any potential client."

Linbrooke
Group Head of IT

“Pentest People were efficient, knowledgeable and very supportive of our organisation making the jump from Cyber Essentials to accreditation to the ‘Plus’ upgrade. They were great to communicate with, delivered as promised and we will certainly use again when re-certification comes round."

Goodform
Head of IT

“The SecureGateway allowed Pentest People to perform a quality penetration test while the tester worked remotely. The results and data collected by the consultant were at the level we would expect from a standard test, showing no real difference other than allowing us to proceed as normal”

Fuelcard Services
Information Security Manager

Pentest People have provided us with a very streamlined testing service, that can be easily reviewed using their SecurePortal. I’m pleased with the quality of the testing report and it has enabled us to feel more confident in our network security”.

Warwickshire City Council
Group head of IT

“We used Pentest People to assist us with our security testing. They truly understand this area extremely well and gave us great reassurance on areas that we needed to improve.

Pentest People are truly experts in the security field and we would highly recommend them. They have great depth of knowledge and breadth of experience”

Waverton Investment Management
Head of IT

"Pentest People perform Web Application and Infrastructure Penetration Testing for Pharmacy2U. They are always professional to engage with, provide an excellent level of service and the addition of the SecurePortal makes receiving and interrogating the results of the service very easy indeed.We look forward to working with them in the future and trust the work they deliver."

Pharmacy2U
Managing Director

Need More Info on Our Infrastructure Testing?

Frequently Asked 
Questions

What is the deliverable from the Phishing service?

The aim of a phishing campaign is to target staff members by simulating a realistic phishing attack and analysing the response from staff members. This allows companies to understand how likely they are to be compromised by a phishing attack and identify key areas/people that may require additional security awareness training. Regular phishing campaigns allow you to track the progress your security awareness training over time.

What impact can phishing have on my company?

Two-thirds of all malware arrives via email attachments and sophisticated phishing emails facilitate 90% of successful cyber attacks. According to trend labs, the average cost of a business email compromise attack is $140,000 but this can be more significant with Leoni AG losing $44.6 million in a single attack. Between 2013 and 2018, over $12 billion was lost to phishing attacks.

What types of phishing Assessments do you offer?

Pentest People offer a broad range of phishing services that can be completely tailored to suit your needs. Typically, a login portal of some kind will be spoofed with code that will gather credentials entered on the page. At this point, we can stop the campaign or as companies often want, we can dig further and try to access systems like office365. Phishing is often executed as part of a larger Social Engineering package that consists of Open Source Intelligence Gathering (OSINT), Telephone phishing and physical intrusion. It can be sold as a single service.

Do I need a Phishing Assessment?

All sized companies can benefit from a phishing assessment. A lot of time and money is spent hardening Infrastructures and Web Applications but ‘people’ are often overlooked even though they are typically the easiest way for an attacker to breach an organisation.