Initial conversation
Is there a specific scenario we should simulate? To whom should the emails go?
71% of targeted attacks included spear phishing as an attack vector. Hoping that your company won't be affected is not a good strategy. This can be confirmed by any company that had to endure a successful cyberattack.
To return to sports: A successful athlete constantly puts himself in as realistic situations as possible β ideally with a sparring partner.
I myself have not yet become a victim of a phishing attack (..yet). But I cannot rule out that it might happen in the future. Why? In the right situation, it can happen to anyone.
And that's exactly why one should prepare for this situation.
Is there a specific scenario we should simulate? To whom should the emails go?
How often was clicked? How often was the reaction correct? What are the next steps?
"If a phishing simulation is not the right measure at the moment, I will tell you. My goal is to increase your IT security β not to sell measures that are not suitable for a company at the moment. That is my claim."
Martin Haunschmid, CEO Adversary GmbH
SIGSEGV: Program failed
Program finished successfully.
Your employees know how the attack would have been recognizable
Your team now knows what to do in an emergency
You know how high the risk is that a real attack goes unnoticed.
In the initial consultation, you will get to know us and our philosophy, and we will briefly discuss how we can help you. So that you and your company:
Hacking
Incident?