Risk
9/21/2010
08:16 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Wombat Launches PhishGuru

SaaS application provides training to users when implementing a penetration test or security assessment

PITTSBURGH, PA September 21, 2010 – Penetration testing and security assessments are invaluable to an organization’s information security program. With the rise of targeted phishing attacks, these tests need to also cover the preparedness of an organization’s workforce. These kinds of evaluations are also increasingly required to maintain compliance with laws, regulations and emerging industry standards such as FISMA, HIPAA, GLBA, FERPA, and PCI-DSS. However, there are downsides if these tests are conducted without proper preparation.

One such case of a penetration test going wrong involved security testers at Andersen Air Force Base sending an in-house simulated phishing email to airmen. The email stated that Transformers 3 would be filmed in Guam and invited the airmen to fill out online applications asking for sensitive information. This kind of exercise is routine for the military and major corporations, but it worked too well when personnel not only responded to the email, but then forwarded the email outside of the base. The rumor that Transformers 3 would be casting extras for the upcoming film spread like wildfire on fan sites and local media. The base had to begin the long and tedious process of informing their employees and local press about the simulated attack.

Rebecca Herold, owner and CEO of Rebecca Herold & Associates, LLC said, “All types of audits and security reviews, including penetration tests, have the possibility of backfiring without proper planning. This has happened in many organizations, of all sizes. To avoid the potential downside of a pen test, it is important to be clear about what has just taken place at the moment the employee has fallen for the simulated attack. This helps to prevent confused and upset employees, numerous calls to the IT department, and negative press.”

How do you negate the adverse effects on the employees of a penetration test? Multiple studies have shown that employees are more receptive to training and able to learn more when training is delivered at the time of the pen test. Wombat Security Technologies’ PhishGuru is a Software-as-a-Service (SaaS) application that lets security professionals provide immediate training to users when implementing a penetration test or security assessment. Using PhishGuru, security professionals can craft a fake phishing email from a variety of templates or create a custom attack that matches actual phishing messages already being sent to employees. They can also incorporate just-in-time training within the simulated attack, so that if an employee clicks on the fake phishing link, he or she receives a training cartoon that describes phishing and teaches them effective strategies for identifying and avoiding future attacks. Herold said, “The PhishGuru approach is unique. It takes advantage of the teachable moment that occurs when users believe they just fell for an attack by providing them practical tips right at that moment. The end result: users have been shown to be more likely to remember and apply those tips when confronted with real phishing attacks.” Another important benefit of such immediate feedback is that training campaigns don’t run amok like the one conducted in Guam.

PhishGuru’s training can also be reinforced with Wombat’s award-winning interactive training modules Anti-Phishing Phil and Anti-Phishing Phyllis. “Wombat’s unique suite of anti-phishing training solutions is by far the most comprehensive and most effective available today,” said Wombat Co-Founder and CEO, Dr. Norman Sadeh. Numerous in-depth evaluations of the suite’s effectiveness, including a study recently published in Scientific American, shows that a single campaign can reduce the chance of an employee falling for subsequent phishing attacks by more than 50 percent, with even more impressive reductions seen after just a few campaigns.

About Wombat Security Technologies With millions of users across North America, Europe, and Asia, Wombat Security Technologies is a global leader in cyber security awareness training and also offers unique anti-phishing filtering solutions. Wombat’s products have been licensed for use in sectors as diverse as finance, government, healthcare, insurance, energy, e-tailing, logistics and education to name just a few.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
5 Security Technologies to Watch in 2017
Emerging tools and services promise to make a difference this year. Are they on your company's list?
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.