RiskTool Phishing and RiskTool Dark Web
The RiskTool offering now includes the ability for customers to launch email campaigns to targeted users for the purpose of identifying those that would have fallen prey to cyber-crime. Statistics clearly show the vulnerability that employees consistently present to the information security of an organization. This functionality is provided in the hopes that companies use this targeted information to reduce their cybersecurity risk profile. Once a user compromises themselves, the system will automatically assign training to be completed in a timely fashion. The system also provides administrators with valuable reports regarding the campaign and the success of their security testing.
Campaigns can be created from a broad number of templates such as Ransomware, Phishing PII, Phishing PHI, Whaling, etc. or customized to fit the specific needs of an organization. Campaigns can be targeted to test vulnerabilities at the discretion of the customer. This puts them in control to meet regulatory and due diligence requirements.
RiskTool Dark Web Monitoring
The introduction of a user’s credentials to the Dark Web can be the beginning of an event that can lead to a compromise of protected information. Most ask; What is the Dark Web? Well, the Dark Web is a hidden universe contained within the “Deep Web”- a sub-layer of the Internet that is hidden from conventional search engines. Search engines like Google, BING, and Yahoo only search .04% of the indexed or “surface” Internet. The other 99.96% of the Web consists of databases, private academic and government networks, and the Dark Web. The Dark Web is estimated at 550 times larger than the surface Web and growing. Because you can operate anonymously, the Dark Web holds a wealth of stolen data and illegal activity.
This service is designed to help both public and private sector organizations detect and mitigate cyber threats that leverage stolen email addresses and passwords. RiskTool Dark Web leverages a combination of human and artificial intelligence that scours botnets, criminal chat rooms, blogs, Websites and bulletin boards, Peer to Peer networks, forums, private networks, and other black-market sites 24/7, 365 days a year to identify stolen credentials and other personally identifiable information (PII).