Skip to Main Content
Coronavirus Phishing Attack Simulation

Coronavirus Phishing Attack Simulation

SKU: 5542
Authors: ITG
Format: 1 simulation
Availability: 25/03/2020
  • Test how your staff respond to coronavirus-based phishing attacks with a simulated and controlled attack.
  • Targets IT users of your choice.
  • Carefully designed and non-destructive.
  • Identifies in detail how vulnerable your organisation is to phishing attacks.

 COVID-19: remote delivery options

We would like to reassure our clients that all training and consultancy services will go ahead as scheduled during the COVID-19 situation. As a company that fully embraces flexible and remote working, we are adjusting our delivery methods to allow us to provide consultancy services, penetration tests and training remotely where necessary. Please also refer to our COVID-19 policy.

For more information about this service or to get a tailored quote for your organisation, please enquire below and one of our experts will be in touch shortly.Enquire about this service
Overview

Coronavirus and phishing

Phishing attacks are quick and easy to implement and deliver an enormous return on investment, which motivate criminals to craft increasingly sophisticated and creative phishing ‘lures’. Malicious attackers are now sending phishing emails and creating fake sites that play on fears related to COVID-19. IT Governance’s testing service offers the chance to assess how your staff respond to these attacks.

This will be carried out in a controlled manner so it does not affect your business in these troubling times. The test will be delivered remotely and can be applied to both staff in the office and those working remotely.

The service applies to organisations with up to 250 staff. It can be delivered to organisations in any sector or industry.


Test how your staff respond to coronavirus-based phishing attacks

This simulated attack will enable you to see how vulnerable your organisation is to phishing attacks – particularly those related to coronavirus – and will include a detailed report on how to address the issues found.

This controlled attack includes:

  • A consultation to determine the extent of the phishing simulation;
  • A scoping plan to target IT users of your choice, whether based at home or in the office;
  • The simulated phishing attack; and
  • A report including full analysis of your vulnerabilities.

  See the full service description here. 


Our service offering

  • A detailed consultation to identify the depth and breadth of the tests required, with careful scoping of the test environment to establish the exact extent of the testing exercise.
  • A range of manual tests conducted by our team of highly skilled penetration testers using a methodology closely aligned with the Open Source Security Testing Methodology (OSSTM).
  • A series of wireless surveys of the scoped environment, with automated and manual identification of vulnerabilities.
  • Immediate notification of any critical vulnerabilities in order for you to take action quickly.
  • A detailed technical report that details the identified vulnerabilities (ranked in order of significance).
  • A list of recommended countermeasures to address any identified vulnerabilities.
  • An executive summary that explains in business terms what the risks mean 
Conditions

Service conditions

  • Quote covers one fixed business premise with a floor space of up to 500m2.
  • Consultant expenses related to travelling, etc. are not included in the price.
  • On-site presentation of report findings and remedial consultations can be provided upon request at an additional cost.
Why IT Governance?

Why choose us?

  • Simulated phishing attacks should only be carried out by experienced consultants with the necessary technical skill set and qualifications. Our consultants have strong technical knowledge and a proven track record in finding security vulnerabilities. They can carry out exploits in a safe manner and advise on appropriate mitigation measures to ensure that your systems are secure.
  • Our CREST-certified testing team will provide you with clarity, technical expertise and peace of mind knowing that your employees’ susceptibility to phishing lures has been assessed by experienced social engineering penetration testers in line with your business requirements.
  • For Azure clients, our penetration tests comply with the Microsoft Rules of Engagement . This means we take care to limit all penetration tests to your assets, thereby avoiding unintended consequences to your customers or your infrastructure.

Kundenbewertungen

oben
This website uses cookies. View our cookie policy.
Laden....