1738 Elton Road Suite 316-A Silver Spring, Maryland 20903240-770-2097contact@secsofttech.com9am - 5pm

SECURITY AWARENESS SERVICES/TRAINING

Reducing human error and combatting the number one IT security threat to any organization: Security threat of social engineering; of employees/users (Human IT Security) Employees are the low hanging fruit that cybercriminals go for.

24 HR SOCIAL ENGINEERING SECURITY MONITORING

Better management of urgent IT security problems of social engineering, spear phishing and ransomware attacks. Designed for employees to understand the mechanisms of spam, phishing, spear phishing, malware and social engineering, and are able to apply this knowledge in their day-to-day job.

 

REAL TIME REPORTING OF PHISHING ATTACKS

Phish Alert add-in button gives users a safe way to forward email threats to their security team for analysis and deletes the email from the user’s inbox to prevent future exposure. All with just one click

 

VULNERABLE BROWSER PLUGIN DETECTION

Information about vulnerable plugins users have installed on their browsers is automatically gathered during a phishing campaign. When a user fails and clicks on a phishing test, they arrive on a landing page which will gather information on what plugins are installed on that user’s browser. We look at the results and compare them to a database of known vulnerable plugins and report it back to you.

 

GEO-LOCATION

See where your simulated phishing attack failures are on a map

 

LEARNING MANAGEMENT SYSTEMS (LMS) INTEGRATION

For organizations with their own LMS, all training can be delivered in industry standard formats such as SCORM and AICC

 

ORGANIZATION POLICY INTEGRATION

Ability to Embed an Organization’s Policy as Part of the Training

 

USB DRIVE TEST

On average 45% of users will plug in USBs they find. This test allows you to test your user’s reactions to unknown USBs

 

SIMULATED PHISHING CAMPAIGNS (PHISHING PENETRATION TEST)

– EZXPLOIT™ (PATENT PENDING)

Intended for all employees in your organization who use a computer, email and internet, from the mail room to the board room. An automated way to pentest your users and prevent hackers from owning your network. Cost a fraction of the manual version.

Menu