Customized Phishing Simulations Keep You “Left of Breach”

Part 3 in a series on being “Left of Breach” in the Phishing Kill Chain. In part 2 we looked at Self-Enumeration, assessing security and business process gaps that phishing attackers exploit. It’s the first step in being “Left of Breach” (see figure below), the process that builds a proactive phishing defense strategy. The next step is designing phishing simulations. As you’ll see, the more they resemble threats your company actually faces, the better. In simulation design, you model known attacks—either against your organization or industry—utilizing Self-Enumeration and analysis of the results. Consider your potential design criteria and incorporate: Known…

The post Customized Phishing Simulations Keep You “Left of Breach” appeared first on PhishMe.


Customized Phishing Simulations Keep You “Left of Breach” was first posted on September 18, 2017 at 9:38 am.
©2017 “PhishMe Staging“. Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at pmit@phishme.com
Continue reading Customized Phishing Simulations Keep You “Left of Breach”

Phishing Incident Response: Get Started in 3 Steps

So, you want to improve your response to phishing threats? Smart idea. PhishMe®’s recent report on phishing response trends shows that phishing is the #1 security concern, but almost half of organizations say they’re not ready for an attack. Here’s how to get your phish together, in three basic steps. Disabuse the “abuse box.” The abuse box is the inbox where companies forward suspicious emails. Sometimes it’s managed by the helpdesk, sometimes by specialized security teams. Nearly always it’s cluttered, stuffed with everything from social media invites to legitimately dangerous malware. That’s why the abuse box usually sucks. Whoever has…

The post Phishing Incident Response: Get Started in 3 Steps appeared first on PhishMe.


Phishing Incident Response: Get Started in 3 Steps was first posted on September 15, 2017 at 2:09 pm.
©2017 “PhishMe Staging“. Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at pmit@phishme.com
Continue reading Phishing Incident Response: Get Started in 3 Steps

Identity Crisis – The Real Cost of a PII Data Breach

As the success of phishing attacks continues to broaden and gain traction in the modern news cycle, it’s important that we understand the differences in impacts based on the type of breach. While over the past year, there has been a lot of talk about the increase in and effectiveness of Ransomware in terms of financial reward and even in forcing political statements from victims, it is critical that we not forget about the designs malicious actors have on PII (Personally Identifiable Information). For example, according to Krebs on Security, the recent Equifax breach noted hackers were motivated to get…

The post Identity Crisis – The Real Cost of a PII Data Breach appeared first on PhishMe.


Identity Crisis – The Real Cost of a PII Data Breach was first posted on September 12, 2017 at 1:15 pm.
©2017 “PhishMe Staging“. Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at pmit@phishme.com
Continue reading Identity Crisis – The Real Cost of a PII Data Breach

Catching Phish with PhishMe Intelligence and ThreatQ

PhishMe IntelligenceTM Integrates with ThreatQuotient’s ThreatQ Platform Swimming in a sea of threat intelligence indicators and services, security teams have been working towards effective ways to centralize, de-duplicate, and correlate massive amounts of threat data. The challenge, once this is done, is acting on what matters most. This requires intelligence, not just data. PhishMe® and ThreatQuotient completed an integration combining PhishMe Intelligence and the ThreatQ threat intelligence platform (TIP). Together, the integration provides security teams the ability to ingest and correlate phishing-specific indicators with easy-to-act-on impact ratings and contextual reports to make security and business decisions with confidence.   PhishMe…

The post Catching Phish with PhishMe Intelligence and ThreatQ appeared first on PhishMe.


Catching Phish with PhishMe Intelligence and ThreatQ was first posted on September 12, 2017 at 9:47 am.
©2017 “PhishMe Staging“. Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at pmit@phishme.com
Continue reading Catching Phish with PhishMe Intelligence and ThreatQ

To Get “Left of Breach,” First Know Thyself

Part 2 in a series on being “Left of Breach” in the Phishing Kill Chain. In part 1 of this series, we talked about getting front of data breaches by taking proactive steps—everything to the left of the bullseye in the figure shown here: Doing this enables you to be “Left of Breach,” a great place to be. To get there, your team first needs to assess where you are now. We call this part of the process Self Enumeration. Here’s what it means and why it matters. Take stock of “normal” conditions. When attempting to manage threats in any…

The post To Get “Left of Breach,” First Know Thyself appeared first on PhishMe.


To Get “Left of Breach,” First Know Thyself was first posted on September 11, 2017 at 10:19 am.
©2017 “PhishMe Staging“. Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at pmit@phishme.com
Continue reading To Get “Left of Breach,” First Know Thyself

Human Phishing Defense Tackle Box – PhishMe Intelligence™ and IBM QRadar®

PhishMe® and IBM have teamed up to provide security operations with essentials for their phishing defense program. Security teams don’t want standalone security products; they need holistic security solutions and through partner integrations. That’s why PhishMe and IBM have partnered to help enterprise businesses defend against credential-stealing, malware, ransomware, and Business Email Compromise (BEC) phishing. Leveraging IBM QRadar and IBM App Exchange, PhishMe Intelligence is an integration solution aimed at providing security teams with the visibility they need to detect, alert, and respond to phishing threats. The PhishMe Intelligence App in IBM Security App Exchange consumes phishing source IPs, URLs,…

The post Human Phishing Defense Tackle Box – PhishMe Intelligence™ and IBM QRadar® appeared first on PhishMe.


Human Phishing Defense Tackle Box – PhishMe Intelligence™ and IBM QRadar® was first posted on September 8, 2017 at 4:07 pm.
©2017 “PhishMe Staging“. Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at pmit@phishme.com
Continue reading Human Phishing Defense Tackle Box – PhishMe Intelligence™ and IBM QRadar®

PhishMe Triage Catches and Mitigates a Phishing Attack on Day 1

BY JOHN TRAVISE AND NICOLAS OCTAVIANI PhishMe Triage™ immediately reveals an active, ongoing phishing attack against a new customer during a configuration and deployment. Summary Talk about immediate results! During a recent PhishMe Triage configuration and deployment engagement, our professional services team could help a customer identify and respond to an ongoing attack. The customer was a high-value target – a global payment processing company and was under a deliberate and sustained phishing attack. With the use of PhishMe Triage and help from PhishMe® consultants, the customer could see the attack happening and effectively respond to the threat. The Attack On…

The post PhishMe Triage Catches and Mitigates a Phishing Attack on Day 1 appeared first on PhishMe.


PhishMe Triage Catches and Mitigates a Phishing Attack on Day 1 was first posted on September 8, 2017 at 11:56 am.
©2017 “PhishMe Staging“. Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at pmit@phishme.com
Continue reading PhishMe Triage Catches and Mitigates a Phishing Attack on Day 1

Want to Get In Front of Breaches? Be like the Marines.

Part 1 in our series on being “Left of Breach” in the Phishing Kill Chain. Too often in the information/cyber security industry, we focus our efforts on mitigation of breaches after they occur, relying on incident response teams to find the needles in the haystack. According to “Left of Bang: How the Marine Corps’ Combat Hunter Program Can Save Your Life,” (by Patrick Van Horne and Jason A. Riley; Foreword by Steven Pressfield) The Marine’s Combat Hunter training program works on this premise: by understanding what “normal” looks like, we are much more likely to recognize activities and behaviors that…

The post Want to Get In Front of Breaches? Be like the Marines. appeared first on PhishMe.


Want to Get In Front of Breaches? Be like the Marines. was first posted on September 5, 2017 at 10:38 am.
©2017 “PhishMe Staging“. Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at pmit@phishme.com
Continue reading Want to Get In Front of Breaches? Be like the Marines.

5 Reasons Hackers Target SMBs—and 1 Free Way to Fight Back

Last week PhishMe® released PhishMe® Free, a no-cost version of our award-winning anti-phishing solution, to protect SMBs from phishing attacks and resulting threats. A new PhishMe white paper shows the urgent need for SMBs to bolster their defenses. According to the paper, “Hacked: Small Businesses in the Crosshairs,” here are just five of the reasons hackers love to target small businesses. They’re easier prey. Phishing attackers like smaller companies because, well, they’re small. They often lack the resources to implement specialized cyber-protection like anti-phishing awareness and reporting. To wit… Only 10 percent of SMBs have a separate budget for cybersecurity.1…

The post 5 Reasons Hackers Target SMBs—and 1 Free Way to Fight Back appeared first on PhishMe.


5 Reasons Hackers Target SMBs—and 1 Free Way to Fight Back was first posted on September 1, 2017 at 10:42 am.
©2017 “PhishMe Staging“. Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at pmit@phishme.com
Continue reading 5 Reasons Hackers Target SMBs—and 1 Free Way to Fight Back

What You Can Do About the WCry (WannaCry) Ransomware

As most of you are aware, a fast moving, self-propagating attack blew across the internet over the weekend, and it’s not over yet. Using an alleged NSA exploit , this malware is able to quickly traverse a network and deliver a ransomware payload affecting hundreds of countries and hundreds of thousands of users. As organizations worked overtime throughout the weekend to respond to the attack and tighten security controls, many are asking us what do I do now, and what happens next? Unfortunately, this malware preys upon many things that organizations would like to fix but often can’t, or can’t…

The post What You Can Do About the WCry (WannaCry) Ransomware appeared first on PhishMe.


What You Can Do About the WCry (WannaCry) Ransomware was first posted on May 15, 2017 at 8:02 pm.
©2017 “PhishMe Staging“. Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at pmit@phishme.com
Continue reading What You Can Do About the WCry (WannaCry) Ransomware