Phishing

Campaign

Many cyber attacks begin with a simple phishing email. Phishing can lead to ransomware infections or give an attacker a internal presence on your corporate network. The fallout from one successful phish can be extremely damaging to an organisations digital assets and public image.

DigitalXRAID offer a highly customisable Phishing Service that delivers a thorough insight into your organisation’s current security posture.

HARPOON X

SERVICES

  • Bespoke email template created for each coustomer. Aims to mimic common
    brand design and contextual content used within your organisation.
  • Custom landing page where users are redirected after a successful phish.
    This landing page can either be awareness training or to a clone web page where
    credentials are captured.
  • Detailed Telemetry and metrics gathered during each phishing campaign.
    Employee awareness progress easily presented and quantified between multiple
    phishing campaigns.

Anatomy of a Phishing Attack

  • Email enters your organisation, It aims to steal employee credentials.
  • Employee clicks a legitimate looking referral button or link within phishing Employee clicks a legitimate looking referral button or link within phishing  email and gets taken to a fake login page.
  • Once credentials are supplied to the fake login page, users are forwarded to Once credentials are supplied to the fake login page, users are forwarded to  the legitimate site and are non the

Ask yourself

Are your employees aware of phishing and the dangers associated with it. ?
How resilient is your organization againgst a phishing attack?
Are your employees aware of phishing and the dangers associated with it.?

HOW TO PREVENT A SUCCESSFUL PHISH

  • Scrutinise the sender address, ensure the domain is official. For example Scrutinise the sender address, ensure the domain is official. For example  [email protected] is legitimate whereas [email protected]  and [email protected] are not.
  • Never use referral links or buttons within emails to access online accounts. Never use referral links or buttons within emails to access online accounts.  Always open your browser separately and manually search and sign into the account  mentioned within the email.
  • Enable Two Factor Authentication [2FA] on all online accounts.

Why DigitalXRAID

Our staff are qualified in their fields, holding years of experience in infrastructure roles from support to senior management. Experience is backed by well known certification including; ISO 27001 lead implementer, CCIE Security, CISSP to name a few. All our testers are trained to our stringent requirements for Check Team Member Status.

Each of our customers is a business partner we have steered safely out of the path of the cyber security threats so commonly seen in the media. We not only deliver a quality service but want to ensure we form an on-going relationship to provide constant protection for your digital assets. We pride ourselves on customer service and adding value to your operation. We are always keen to hear your ideas on how we can better our services and we can tailor bespoke packages to help solve your ICT problems.

Our staff are skilled at servicing and communicating with both large blue chip corporate enterprises or start-ups and SME’s, thoroughly understanding the needs of both. We bring industry leading services to anyone with the desire to secure and harden their digital assets. We pride ourselves in bringing corporate level services within the reach of business of all sizes and budgets. All business large or small is at risk to cyber security breach. Business leaders need partnerships with security experts to ensure they are not the ones caught out by malicious brand damage or information theft.

We have worked with technical, creative and non-technical specialists to create an easy to digest report. The aim is that our report can easily be interpreted by technical and non-technical senior stakeholders. All reports are peer reviewed in line with ISO9001 quality standards prior to submission, to ensure the utmost quality and clarity.

Our pricing structure is clearly presented in every quote. The scope of the project will be clear to ensure both parties know exactly what the key deliverable are, how long it will take and the costs.

Each of our customers is a business partner we have steered safely out of the path of the cyber security threats so commonly seen in the media. We not only deliver a quality service but want to ensure we form an on-going relationship to provide constant protection for your digital assets. We pride ourselves on customer service and adding value to your operation. We are always keen to hear your ideas on how we can better our services and we can tailor bespoke packages to help solve your ICT problems.