Risk Defenders offers bi-annual fully automated simulated phishing attack assessments. Our email campaign phishing assessment offers customized scenarios testing your employee’s security awareness. The phishing assessment consists of email campaigns that evaluate your employee’s knowledge of corporate security policy, situational awareness and security knowledge. Our assessment will attempt to manipulate your employees to perform malicious actions by clicking on links, downloading files or providing personally identifiable information (PII) over email. Through a series of scheduled random or target email sweeps, we will perform the following email tests; Link Test, Attachment Test, Data Entry Test, Spear Phishing Test and Exploit Pen Test. All attempts are tracked and metrics are provided to you in our custom reports.
Risk Defenders offers USB removable device phishing assessments. Our USB drive test allows us to test your employees on how they will react to finding unknown removable storage devices such as thumb drives. Although this test is harmless, the results can be invaluable. This random or targeted campaign will track if the files placed on these drives by Risk Defenders are accessed, and information such as access time and IP address is collected and used for assessment reporting for your review.
Risk Defenders offers the telephone equivalent of phishing, commonly known as vishing. Risk Defenders will perform a phone campaign in an attempt to verbally steer your employees into surrendering sensitive information like passwords, usernames, account numbers or other commonly used social engineering techniques. Social engineers attack through many vectors and sometimes its your employee that is the weakest link, so train your employees to recognize threats from multiple sources, especially phone requests. The phone campaign is a customized assessment which presents your employees with unique and common scenarios, testing your employees security awareness. Our assessment will attempt to manipulate your employees to divulge sensitive or g personally identifiable information (PII) via phone. All attempts are tracked and metrics are provided to you in our custom reports.