Security Assessment

Cyber Security Assessment creates a clear report of the cyber risks, covering the areas.

  1. People: for instance, the sensitivity to phishing.
  2. Organization and processes: for instance the accessibility of systems or back-up procedures or procedures upon termination of employment.
  3. The technology: for instance online security, cloud security, firewalls, network security, data security.

Phishing simulation, interviews with users and IT staff and pen tests are part of the assessment.
Compliance assessment can be part of the CSA, if necessary.
Result: a CSA report with the cyber risks and optionally a calculation of the potential financial damage.

time
 

 
aggressive

Security Improvement

Based on the CSA report, a Cyber ​​Security Improvement (CSI) plan will be created to increase cyber security.

  1. Installation of a permanent phishing simulator using Social Engineering to continuously update the phishing awareness of all employees (on-going process).
  2. Training and coaching to bring about necessary behavioural change.
  3. Adjustments to procedures, such as changes in the allocation of access rights.
  4. Technical adjustments to cloud use, better security of the online environment or local infrastructure.

Financial realism is always the starting point of any CSI plan.
After approval of the CSI plan by the client, the plan is implemented.
In order to increase involvement and limit costs in the implementation of the plan, we will involve the client’s employees as much as possible. They will be coached by consultants from Phished Security.

 

 

Phishing Prevention

Humans are often the weakest spot in IT security. Cyber criminals successfully use phishing mails to steal login data, credit card data and to install malware.

There is no technical solution for phishing mails. All users need to be trained to recognise phishing mails, but incidental awareness training has only a limited and temporary effect, while ongoing awareness is required.

Phished Security provides an automated phishing simulation training tool. This tool periodically sends simulated phishing mails. An artificial intelligence system uses advanced social engineering to generate vicious phishing mails, similar to phishing mails from advanced cyber criminals.
Management and users will receive periodical reports to monitor and improve permanent awareness.

Click here for a free trial of the phishing simulation training tool

 

 
aggressive

Response Readiness

Even with the best cyber security, the risk of a cyber-attack remains.
It is wise to be prepared for this, in order to quickly respond to limit the damage:

  1. Incident analysis, i.e. detection of the leaks.
  2. Adjustments to procedures, such as changes in the allocation of access rights.
  3. Damage mitigation measures, including repairing the leaks and possibly limiting access to critical systems and data to prevent further damage.
  4. Communicating with employees, affected clients and often the public media. Speed appears to be crucial to prevent reputation damage.
  5. Restore systems and data with backups.

The required high response speed is only achievable when a detailed Response Readiness Plan (RRP) is present before the attack. Consultants from Phished Security may create this plan using the client’s employees.

 

 

About Us / Contact

Phished Security was founded in 2019 as a subsidiary of Baker Boucher.
It includes a group of senior cyber security specialists and specialists in human behaviour. They work in close cooperation with colleagues connected to the university of Leuven (Belgium) for the artificial intelligence systems behind the advanced social engineering.


Office Address: Leeghwaterstraat 3-02, 2811 DT Reeuwijk, The Netherlands
Email: info@bakerboucher.com
Telephone: +31 6 55162838 or +31651468796 or +31650850350

quality