Risk

9/21/2010
08:16 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Wombat Launches PhishGuru

SaaS application provides training to users when implementing a penetration test or security assessment

PITTSBURGH, PA September 21, 2010 – Penetration testing and security assessments are invaluable to an organization’s information security program. With the rise of targeted phishing attacks, these tests need to also cover the preparedness of an organization’s workforce. These kinds of evaluations are also increasingly required to maintain compliance with laws, regulations and emerging industry standards such as FISMA, HIPAA, GLBA, FERPA, and PCI-DSS. However, there are downsides if these tests are conducted without proper preparation.

One such case of a penetration test going wrong involved security testers at Andersen Air Force Base sending an in-house simulated phishing email to airmen. The email stated that Transformers 3 would be filmed in Guam and invited the airmen to fill out online applications asking for sensitive information. This kind of exercise is routine for the military and major corporations, but it worked too well when personnel not only responded to the email, but then forwarded the email outside of the base. The rumor that Transformers 3 would be casting extras for the upcoming film spread like wildfire on fan sites and local media. The base had to begin the long and tedious process of informing their employees and local press about the simulated attack.

Rebecca Herold, owner and CEO of Rebecca Herold & Associates, LLC said, “All types of audits and security reviews, including penetration tests, have the possibility of backfiring without proper planning. This has happened in many organizations, of all sizes. To avoid the potential downside of a pen test, it is important to be clear about what has just taken place at the moment the employee has fallen for the simulated attack. This helps to prevent confused and upset employees, numerous calls to the IT department, and negative press.”

How do you negate the adverse effects on the employees of a penetration test? Multiple studies have shown that employees are more receptive to training and able to learn more when training is delivered at the time of the pen test. Wombat Security Technologies’ PhishGuru is a Software-as-a-Service (SaaS) application that lets security professionals provide immediate training to users when implementing a penetration test or security assessment. Using PhishGuru, security professionals can craft a fake phishing email from a variety of templates or create a custom attack that matches actual phishing messages already being sent to employees. They can also incorporate just-in-time training within the simulated attack, so that if an employee clicks on the fake phishing link, he or she receives a training cartoon that describes phishing and teaches them effective strategies for identifying and avoiding future attacks. Herold said, “The PhishGuru approach is unique. It takes advantage of the teachable moment that occurs when users believe they just fell for an attack by providing them practical tips right at that moment. The end result: users have been shown to be more likely to remember and apply those tips when confronted with real phishing attacks.” Another important benefit of such immediate feedback is that training campaigns don’t run amok like the one conducted in Guam.

PhishGuru’s training can also be reinforced with Wombat’s award-winning interactive training modules Anti-Phishing Phil and Anti-Phishing Phyllis. “Wombat’s unique suite of anti-phishing training solutions is by far the most comprehensive and most effective available today,” said Wombat Co-Founder and CEO, Dr. Norman Sadeh. Numerous in-depth evaluations of the suite’s effectiveness, including a study recently published in Scientific American, shows that a single campaign can reduce the chance of an employee falling for subsequent phishing attacks by more than 50 percent, with even more impressive reductions seen after just a few campaigns.

About Wombat Security Technologies With millions of users across North America, Europe, and Asia, Wombat Security Technologies is a global leader in cyber security awareness training and also offers unique anti-phishing filtering solutions. Wombat’s products have been licensed for use in sectors as diverse as finance, government, healthcare, insurance, energy, e-tailing, logistics and education to name just a few.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
New Bluetooth Hack Affects Millions of Vehicles
Dark Reading Staff 11/16/2018
Understanding Evil Twin AP Attacks and How to Prevent Them
Ryan Orsi, Director of Product Management for Wi-Fi at WatchGuard Technologies,  11/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-19406
PUBLISHED: 2018-11-21
kvm_pv_send_ipi in arch/x86/kvm/lapic.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where the apic map is uninitialized.
CVE-2018-19407
PUBLISHED: 2018-11-21
The vcpu_scan_ioapic function in arch/x86/kvm/x86.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized.
CVE-2018-19404
PUBLISHED: 2018-11-21
In YXcms 1.4.7, protected/apps/appmanage/controller/indexController.php allow remote authenticated Administrators to execute any PHP code by creating a ZIP archive containing a config.php file, hosting the .zip file at an external URL, and visiting index.php?r=appmanage/index/onlineinstall&url= ...
CVE-2018-19387
PUBLISHED: 2018-11-20
format_cb_pane_tabs in format.c in tmux 2.7 through 2.8 might allow attackers to cause a denial of service (NULL Pointer Dereference and application crash) by arranging for a malloc failure.
CVE-2018-19388
PUBLISHED: 2018-11-20
FoxitReader.exe in Foxit Reader 9.3.0.10826 allows remote attackers to cause a denial of service (out-of-bounds read, access violation, and application crash) via TIFF data because of a ConvertToPDF_x86!ReleaseFXURLToHtml issue.