A Vulnerability Assessment is a review of assets to discover what weaknesses may exist and will present risk to the organization due to misconfigurations, unpatched systems, or user behavior.
In the initial phase of a Phishing Simulation, users are sent phishing emails designed to elicit and measure responses in three key areas: opens, clicks, and exploitation. Results in each of these phases are recorded to produce associated attempts and success rates. We then estimate the organization’s current risk associated with phishing attacks and identify gaps in end-user training across departments, organizational hierarchy, or specific attack techniques.
The second phase is a type of penetration test during which various attacks; such as the use of captured credentials and exploitation of client applications, are deployed against machines representative of those identified to be at-risk during the initial phase.
Contact us to get started.