Vulnerabilities / Threats
4/11/2016
05:00 PM
Dark Reading
Dark Reading
Products and Releases
100%
0%

KnowBe4 Unveils Kevin Mitnick Security Awareness Training Spring 2016

KnowBe4 adds first human pentest, USB drive test, and geo-location to simulated phishing testing.

(Clearwater/Tampa Bay, FL) April 12, 2016 -- KnowBe4 Inc., the United States’ most popular integrated platform for security awareness training and simulated phishing tests, released a new Spring 2016 version with advanced security features, bringing enterprise level security features to SMBs. Exploding threats of ransomware, CEO email fraud and other social engineering attacks make employee training a must. KnowBe4 helps IT manage the risks of social engineering with advanced security features in its new Kevin Mitnick Security Awareness Training Spring 2016.

An FBI alert issued on April 4, 2016 warned of a massive increase in CEO fraud to the tune of 2.3 billion dollars. Companies are now realizing they cannot keep doing the same old annual awareness training, as threats are evolving much faster.

KnowBe4’s program provides a comprehensive new-school approach that integrates baseline testing using mock attacks, engaging web-based training and continuous assessment through simulated phishing, vishing or smishing attacks to build a more resilient and secure organization. KnowBe4 also provides "double-random" message delivery with hundreds of highly realistic phishing messages, spread over time. Every employee receives a different phishing email at a different time, eliminating the “prairie dog” effect. Automated phishing campaigns with unlimited usage and community templates help keep IT efforts current. The new advanced features include:

  • EZXploit™: Includes patent pending functionality that allows an internal, fully automated "human pentest". By launching a simulated phishing attack, which when clicked, comes up with a secondary ruse like a Java popup that the user is further social engineered to click on. No malicious action is performed but the process allows IT to see which data is accessible and users most prone to click by scanning info such as user name, IP address, a user's workstation and Active Directory info.

KnowBe4’s Chief Hacking Officer Kevin Mitnick stated "EZXploit truly assesses whether your business can be exploited by the bad guys. Just clicking on a link sent in email alone doesn't mean your business can be successfully phished. The true test is to determine whether the user can be exploited. EZXploit allows you to evaluate that risk."

  • USB Drive Test™: A customer can download a special, "beaconized" Microsoft Office file from the KnowBe4 admin console onto a USB drive which can then be dropped at an on-site, high traffic area. If an employee picks up the USB drive, plugs it in their workstation, and opens the file, it will "call home" and report the fail.

A recent study sponsored by University of Illinois, University of Michigan and Google, found 98% picked up dropped USBs and 45% opened or enabled files, confirming this as an effective attack vector for social engineering.

  • GEO-location was added by KnowBe4 to its phishing templates, allowing an admin to see where simulated phishing attack failures are on a map, with drilldown capability and CSV-export options. This is highly useful for multi-site offices and road warriors alike.

KnowBe4’s CEO Stu Sjouwerman stated, “Employees are the weakest link in your network security and you need effective security awareness training to keep on top of furiously innovating cybercrime. The new features we are announcing were previously out of reach for IT managers with limited budget, and we have worked hard to make effective training and frequent simulated phishing affordable for these companies.”

The strong demand for KnowBe4’s training has propelled it into the Cybersecurity 500 and fueled unparalleled growth for 11 straight quarters.

For more information, pricing, or demos, visit www.KnowBe4.com

About KnowBe4
KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. Realizing that the human element of security was being seriously neglected, KnowBe4 was created by two of the best known names in cybersecurity, Kevin Mitnick (the World’s Most Famous Hacker), and Inc. 500 alum serial security entrepreneur Stu Sjouwerman, to help organizations manage the problem of social engineering tactics through new school security awareness training. The company maintains a top spot in the Cybersecurity 500, the definitive list of the world’s hottest and most innovative companies in cybersecurity. More than 3,500 organizations use KnowBe4’s platform to keep employees on their toes with security top of mind. KnowBe4 is used across all industries, including highly regulated fields such as finance, healthcare, energy, government and insurance.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
121 Pieces of Malware Flagged on NSA Employee's Home Computer
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/16/2017
Mobile Malware Incidents Hit 100% of Businesses
Dawn Kawamoto, Associate Editor, Dark Reading,  11/17/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Managing Cyber-Risk
An online breach could have a huge impact on your organization. Here are some strategies for measuring and managing that risk.
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.