Wombat PhishGuru Supports Mobile Devices
PhishGuru lets security professionals craft fake phishing emails to assess and train employees
August 17, 2011
PRESS RELEASE
PITTSBURGH, PA August 16, 2011 - Wombat Security Technologies (Wombat) ) today announced the latest enhancements to PhishGuru, its anti-phishing email assessment and training service. Version 2.0 of PhishGuru now includes “on-the-spot” training and reporting when employees fall for a simulated attack initiated from a mobile device. PhishGuru simulation training not only reduces the chance of employees falling for an attack by 60% with one round, it also provides administrators and security officers powerful information to assess where their organizations are most vulnerable. Recent studies show that mobile phone users are three times more likely to fall for a phishing attack than PC users with high-profile vulnerabilities like Android making headlines daily. Wombat’s service will now enable organizations to deliver fast and effective training that prevents users from falling for mobile-based phishing attacks.
“Good security is a function of people, process and technology – we tend to focus on technology but without proper training - people will always be the weakest link,” said Diana Kelley, analyst from Security Curve. “That is what makes good awareness training so difficult – it is not a box you plug in and turn on – it requires an understanding not just of security but of people, their processes and the technology they use. There is a huge need for effective awareness training, and plenty of opportunity for those who can innovate in the market.”
Wombat’s PhishGuru is a Software-as-a-Service (SaaS) application that lets security professionals craft fake phishing emails to assess and train their employees. Version 2.0 reveals whether an employee fell for an attack through a mobile phone, a tablet, or their computer, and specifically what type of device and browser they were using. Also included in the 2.0 release of PhishGuru is the ability for administrators to send fake malicious attachments, phishing links or data entry pages.
PhishGuru comes with extensive reporting and analysis so security officers and IT personnel can quickly identify organizational weaknesses and specific traps to which their company is most susceptible. PhishGuru's training can also be reinforced with Wombat’s award-winning interactive training modules which feature a unique, interactive approach based on “learning science” principles and engaging formats proven to help users retain training information.
To enable simulation training, PhishGuru comes with a variety of templates that mirror actual phishing attacks seen in the real world. Another option is that administrators can create a custom phishing email message. They can also choose from a set of training templates that incorporate “just-in-time” training when the users fall for a simulated attack.
“PhishGuru's approach is unique, taking advantage of the teachable moment that occurs when an employee believes they fell for an attack,” said Joe Ferrara, President and CEO of Wombat Security Technologies. “We provide immediate training at that moment when users are most receptive to learning. We also have accounts where over 95% of users that fell for a mock attack voluntarily took additional training when given the opportunity.”
About Wombat Security Technologies
With millions of users across North America, Europe, and Asia, Wombat Security Technologies is a global leader in cyber security awareness training. Wombat’s products include the most comprehensive and effective suite of anti-phishing training and assessment products available in the market place today. Wombat’s dedicated anti-phishing filtering solutions have been shown to be significantly more effective than the most popular anti-spam filters when it comes to catching phishing attacks, including zero-hour attacks. Wombat’s products have been licensed for use in sectors as diverse as finance, government, insurance and healthcare to name just a few.
You May Also Like
A Cyber Pros' Guide to Navigating Emerging Privacy Regulation
Dec 10, 2024Identifying the Cybersecurity Metrics that Actually Matter
Dec 11, 2024The Current State of AI Adoption in Cybersecurity, Including its Opportunities
Dec 12, 2024Cybersecurity Day: How to Automate Security Analytics with AI and ML
Dec 17, 2024The Dirt on ROT Data
Dec 18, 2024