Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help
ProServ

Overview

This project aims to assess the security measures of your company in the area of protection against phishing attacks, with a primary focus on employee education and training. Not included in this project is the examination of technical protective functions such as spam filters.

The project can be divided into 3 phases:

Phase 1 - Planning and Preparation: The first step is to plan and prepare the phishing project. This includes defining goals, selecting test groups and phishing methods, as well as creating phishing emails or websites. Setting the timetable is also part of this phase.

Phase 2 - Implementation of the Phishing Campaign: During this phase, phishing attacks are executed. Emails are sent to selected test groups, deceiving recipients into believing they come from a trustworthy source. Clicking on links or opening attachments is intended to entice recipients to disclose their credentials or other confidential information. The creation of fake websites, pretending to be the original, is also part of the phishing methods.

Phase 3 - Evaluation of Results: In this phase, the results of the phishing campaign are analyzed. This involves assessing how many recipients responded to the phishing emails, how many were directed to the fake websites, and what information was disclosed. The success rate of different phishing methods is also examined. The findings are documented in a final report.

Subsequently, based on the results of the phishing campaign, recommendations and measures are developed to enhance security against phishing attacks. These recommendations typically involve organizational measures such as training or guidelines. The creation of contingency plans in the event of a successful phishing attack may also be part of the recommendations.

Overall, this project aims to assess a company's security measures against phishing attacks and uncover areas for improvement. Through the analysis of results and the development of recommendations and measures, vulnerabilities can be targeted, and the overall security of the company can be enhanced.

Sold by Bechtle Clouds GmbH
Categories
Fulfillment method Professional Services

Pricing Information

This service is priced based on the scope of your request. Please contact seller for pricing details.

Support

Bechtle IT-Systemhaus Chemnitz E-Mail: cdc.chemnitz@bechtle.com