SlideShare a Scribd company logo
2
Most read
13
Most read
Sophos Central Phish Threat
23 November 2018
Solution: Combine Email Security with Education
Educate and test your users to spot attacks
• Over 140 attack
templates using real
threat intelligence
TEST
1
• Deliver over 30
interactive security
training courses
TRAIN
2
• Campaign reporting
• Measure organization
and individuals
MEASURE
3
2
Attack
Email
Caught
Email
Training
Enrollment
Email
Attack
Landing
Page
Reminder
Email
Caught User
Landing
Page
Training
Landing
Page
PHISHING LINK CAMPAIGNS
Lure an employee to click on a link in an email
Phish Threat Campaigns
ATTACHMENT CAMPAIGNS
Simulate an attack involving a malicious Office attachment
TRAINING CAMPAIGNS
Enroll employees directly in training without simulation
CREDENTIAL HARVESTING CAMPAIGNS
Lure an employee into entering login credentials online
Customizable content and branding
4
Optional ‘campaign types’ video
100’s of Customizable Attack Templates
 Choice of 9 languages
 Realistic simulations powered by global
threat intelligence
 Library of international templates from
beginner to expert
Multiple scenarios and difficulties
 Plain text business
updates
 Australian Federal
Police
 Amazon
 DVLA
 Canada Post
 New Zealand Inland
Revenue
Department
 Parcelforce
 Apple
Growing library of international content
5
6
Optional ‘attack templates’ video
Over 60 Employee Training Modules
 Phishing
 Credential harvesting
 Vishing (phone phishing)
 Social engineering
 Ransomware
 Secure social media use
 Public Wi-Fi
 Malicious attachments
 Passwords & passphrases
 Two-factor
authentication
 Principle of least privilege
 Physical security and data
protection
 EU General Data Protection Regulation (GDPR)
 Gramm-Leach-Bliley Act (GLBA)
 Health Insurance Portability and Accountability Act (HIPAA)
 Payment Card Industry Data Security Standard (PCI DSS)
Security Topics
Compliance Topics
7
Range of video styles
 Interactive quiz following each course
 Full reporting of course completion
Knowledge checks
Interactive modules
Gamification
Changing Behaviour from
‘Knowing’ to ‘Doing’
8
Phish Threat Enhanced Reporting
9
Endpoint
Email
Web
XG Firewall
Dashboard
Reports
Campaigns
PHISH THREAT
10
11
12
PRIVATE AND CONFIDENTIAL
Sales Hotline
+65 6805 8988
Sales Email Enquires
contact@netpluz.asia
24x7 Helpdesk Hotline
1800 NETPLUZ (1800 6387589)
https://www.netpluz.asia

More Related Content

PPT
IT Security Awareness-v1.7.ppt
PDF
Employee Security Awareness Program
PPTX
Cybersecurity Training
PPTX
Endpoint Protection
PPTX
Phishing simulation exercises
PDF
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
PPTX
Phishing awareness
PDF
Cybersecurity Employee Training
IT Security Awareness-v1.7.ppt
Employee Security Awareness Program
Cybersecurity Training
Endpoint Protection
Phishing simulation exercises
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
Phishing awareness
Cybersecurity Employee Training

What's hot (20)

PPTX
Phishing ppt
PDF
End-User Security Awareness
PDF
From SIEM to SOC: Crossing the Cybersecurity Chasm
PPTX
Threat Hunting with Splunk
PDF
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
PPT
Asset, Vulnerability, Threat, Risk & Control
PPT
Phishing attacks ppt
PPTX
Security Awareness Training.pptx
PPTX
Cyber attacks and IT security management in 2025
PPTX
Information Security Awareness
PPTX
Siem ppt
PPTX
The Zero Trust Model of Information Security
PPTX
Security awareness
PPT
Employee Security Training[1]@
PPTX
Cybersecurity Awareness Training for Employees.pptx
PPTX
Security Information and Event Managemen
PDF
IBM Security Strategy Overview
PPTX
Security Information and Event Management (SIEM)
PDF
Bulding Soc In Changing Threat Landscapefinal
PPTX
Ppt growing need of cyber security
Phishing ppt
End-User Security Awareness
From SIEM to SOC: Crossing the Cybersecurity Chasm
Threat Hunting with Splunk
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Asset, Vulnerability, Threat, Risk & Control
Phishing attacks ppt
Security Awareness Training.pptx
Cyber attacks and IT security management in 2025
Information Security Awareness
Siem ppt
The Zero Trust Model of Information Security
Security awareness
Employee Security Training[1]@
Cybersecurity Awareness Training for Employees.pptx
Security Information and Event Managemen
IBM Security Strategy Overview
Security Information and Event Management (SIEM)
Bulding Soc In Changing Threat Landscapefinal
Ppt growing need of cyber security
Ad

Similar to Email Phishing Test Simulation, Educating the Users (20)

PPTX
PhishThreat.pptx
PPTX
Keepnet Labs. Cybersecurity Awareness 5min. Presentation
PPT
Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011
PDF
Phishing Simulation By Shield Alliance
PPT
Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010
PPT
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
PDF
phishing facts be aware and do not take the bait
PDF
Information Security Awareness
PDF
Phishing 101: Part-2 Blog Welcome to this Phishing Blog Part2
PPT
Knowledgeable Users are the Best Cyber Security Defense, for ISSA webinar Sep...
PPTX
How I Will Phish You
PPTX
Cyber_Security_Awareness_Program_Presentation.pptx
PDF
Webinar - Reducing Your Cybersecurity Risk
PPTX
Educate Your Users Not To Take The Bait: Introduction To Phishing As A Service
PPTX
Phishing your campus
PDF
How To Catch a Phish: User Awareness and Training
PPT
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
PDF
awareness for employee in the organization
PPTX
Organizational Phishing Education
PPTX
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
PhishThreat.pptx
Keepnet Labs. Cybersecurity Awareness 5min. Presentation
Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011
Phishing Simulation By Shield Alliance
Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
phishing facts be aware and do not take the bait
Information Security Awareness
Phishing 101: Part-2 Blog Welcome to this Phishing Blog Part2
Knowledgeable Users are the Best Cyber Security Defense, for ISSA webinar Sep...
How I Will Phish You
Cyber_Security_Awareness_Program_Presentation.pptx
Webinar - Reducing Your Cybersecurity Risk
Educate Your Users Not To Take The Bait: Introduction To Phishing As A Service
Phishing your campus
How To Catch a Phish: User Awareness and Training
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
awareness for employee in the organization
Organizational Phishing Education
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
Ad

More from Netpluz Asia Pte Ltd (20)

PDF
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
PDF
Cyber Risk Management in the New Digitalisation Age - eSentinel™
PDF
Netpluz corp presentation 2020
PPTX
Secure & Protect your Data with Druva
PPTX
The State of Ransomware 2020
PPTX
Simplifying Communication with Microsoft Teams & Netpluz SIP Trunk
PPTX
SAY HELLO TO MICROSOFT TEAMS
PDF
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
PDF
eSentinel™ – 360° Cybersecurity Platform Simplified
PPTX
Using a secured, cloud-delivered SD-WAN to transform your business network
PPTX
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
PPTX
Netpluz DDoS Mitigation - Managed Cyber Security
PPTX
Netpluz - Managed Firewall & Endpoint Protection
PPTX
Netpluz Managed Cyber Security
PPTX
Netpluz Managed SOC - MSS Service
PPTX
VAPT - Vulnerability Assessment & Penetration Testing
PDF
SME Cyber Insurance
PPTX
Netpluz Managed Services Portfolio
PPTX
Y5Zone Singapore - Wifi Advertisement & EDM services
PPTX
Getting ready for wi-fi 6 and IOT
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - eSentinel™
Netpluz corp presentation 2020
Secure & Protect your Data with Druva
The State of Ransomware 2020
Simplifying Communication with Microsoft Teams & Netpluz SIP Trunk
SAY HELLO TO MICROSOFT TEAMS
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel™ – 360° Cybersecurity Platform Simplified
Using a secured, cloud-delivered SD-WAN to transform your business network
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz DDoS Mitigation - Managed Cyber Security
Netpluz - Managed Firewall & Endpoint Protection
Netpluz Managed Cyber Security
Netpluz Managed SOC - MSS Service
VAPT - Vulnerability Assessment & Penetration Testing
SME Cyber Insurance
Netpluz Managed Services Portfolio
Y5Zone Singapore - Wifi Advertisement & EDM services
Getting ready for wi-fi 6 and IOT

Recently uploaded (20)

PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Empathic Computing: Creating Shared Understanding
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
KodekX | Application Modernization Development
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
cuic standard and advanced reporting.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
MYSQL Presentation for SQL database connectivity
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Unlocking AI with Model Context Protocol (MCP)
Empathic Computing: Creating Shared Understanding
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
The AUB Centre for AI in Media Proposal.docx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
KodekX | Application Modernization Development
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Spectral efficient network and resource selection model in 5G networks
20250228 LYD VKU AI Blended-Learning.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Building Integrated photovoltaic BIPV_UPV.pdf
Review of recent advances in non-invasive hemoglobin estimation
cuic standard and advanced reporting.pdf

Email Phishing Test Simulation, Educating the Users

  • 1. Sophos Central Phish Threat 23 November 2018
  • 2. Solution: Combine Email Security with Education Educate and test your users to spot attacks • Over 140 attack templates using real threat intelligence TEST 1 • Deliver over 30 interactive security training courses TRAIN 2 • Campaign reporting • Measure organization and individuals MEASURE 3 2
  • 3. Attack Email Caught Email Training Enrollment Email Attack Landing Page Reminder Email Caught User Landing Page Training Landing Page PHISHING LINK CAMPAIGNS Lure an employee to click on a link in an email Phish Threat Campaigns ATTACHMENT CAMPAIGNS Simulate an attack involving a malicious Office attachment TRAINING CAMPAIGNS Enroll employees directly in training without simulation CREDENTIAL HARVESTING CAMPAIGNS Lure an employee into entering login credentials online Customizable content and branding
  • 5. 100’s of Customizable Attack Templates  Choice of 9 languages  Realistic simulations powered by global threat intelligence  Library of international templates from beginner to expert Multiple scenarios and difficulties  Plain text business updates  Australian Federal Police  Amazon  DVLA  Canada Post  New Zealand Inland Revenue Department  Parcelforce  Apple Growing library of international content 5
  • 7. Over 60 Employee Training Modules  Phishing  Credential harvesting  Vishing (phone phishing)  Social engineering  Ransomware  Secure social media use  Public Wi-Fi  Malicious attachments  Passwords & passphrases  Two-factor authentication  Principle of least privilege  Physical security and data protection  EU General Data Protection Regulation (GDPR)  Gramm-Leach-Bliley Act (GLBA)  Health Insurance Portability and Accountability Act (HIPAA)  Payment Card Industry Data Security Standard (PCI DSS) Security Topics Compliance Topics 7 Range of video styles  Interactive quiz following each course  Full reporting of course completion Knowledge checks Interactive modules Gamification
  • 9. Phish Threat Enhanced Reporting 9 Endpoint Email Web XG Firewall Dashboard Reports Campaigns PHISH THREAT
  • 10. 10
  • 11. 11
  • 12. 12
  • 13. PRIVATE AND CONFIDENTIAL Sales Hotline +65 6805 8988 Sales Email Enquires contact@netpluz.asia 24x7 Helpdesk Hotline 1800 NETPLUZ (1800 6387589) https://www.netpluz.asia

Editor's Notes

  • #3: Combine email security with simulated phishing attacks that allow you to test user awareness by emulating the tactics used by real phishing attackers, and couple that with training to educate end users so they know how to spot and stop the real thing. And perhaps most importantly measure progress and improvement to demonstrate ROI to the rest of the business. Phish Threat from Sophos does all three. With over 140 customizable attack templates fed by latest threat intelligence Over 30 interactive training courses covering a range security and compliance topics And comprehensive reporting. Allowing you to measure performance by campaign, individual user, and at an organizational level to measure susceptibility to attack.
  • #4: A range of customizable campaigns that mirror the tactics used in real phishing attacks. Phishing link campaign – where we are trying to lure a user to click a phishing link Credential harvesting – this time where we are sending users to a fake credential harvesting website to enter username and password details (don’t worry, we don’t store any data) Attachment campaigns – where we lure a use to open an attachment that could in the real word contain a malware downloader for instance And lastly a Training-only campaign – no simulated attack this time. You create your own branded email and attach training Each campaign style is fully customizable – from attack email, to training landing pages and training reminder emails. All templates and training is available in a choice of nine languages: English French German Italian Spanish Portguese Korean Traditional Chinese Japanese
  • #5: Campaign selection We start off here are the New campaign page in Sophos Central, and after giving our campaign a name. we have 4 options for the type of campaign you’d like to build for your end users: Here you can choose between Phishing link campaigns Credential harvesting where we’ll lure users to a fake web page to enter details (don’t worry we don’t store anything) You’ve then got Attachment campaigns – trying to trick users into opening a document file And lastly, training-only campaigns. No simulated attack here. We’re sending your branded email, with your choice of training. Once we’ve chosen a campaign, simply select your preferred language from a choice of nine. And that will be applied to the email template and training module. You can even apply that language to whole Sophos Central interface if you like.
  • #6: More than 500 customisable attacks templates to choose from, all fed by the latest threat intelligence from SophosLabs, and our industry experts.   And they include banks, retail brands, social media, IT services and simple plain text emails that could have been sent by a colleague.   And with new templates added every week, It’s easy to find the type of email template you want. Filter by difficultly level and identify the latest content with “New” and “Featured” labels  
  • #7: You have more than 500 customisable attacks templates to choose from, all fed by the latest threat intelligence from SophosLabs, and our industry experts. And they include banks, retail brands, social media, IT services and simple plain text emails that could have been sent by a colleague. And with new templates added every week, It’s easy to find the type of email template you want. First you quickly filter by difficulty level. Or look out for these handy flags First….Our Featured Templates These are the latest phishing attacks and seasonal campaigns. Helping you train users to identify real-world attacks hitting inboxes today and the seasonal campaigns they need to know about. And in the case of credential harvesting attacks you can also see the web page your users will be sent to after clicking the email And for the freshest campaigns – look for the New templates All of these have been added in the past 30 days. And every template can be fully customised later on.   So let’s select our email and take a look at training
  • #8: Realistic email templates are only the start With Phish Threat, you get a Single license model to keep decisions simple - covering Unlimited campaigns – unlimited templates and all the training modules available.   Each course is an average of 5mins in length – making them extremely accessible for those busy employees   And they cover a range of topics shown on screen.   With each course containing a detailed summary and preview option for the admin and end user.   And as we switch to the end user experience you’ll see the Seamless delivery of content in action – with no need for passwords.   And the user benefits from a range of training content to support all learning styles = From videos, interactive courses and gamification, each with a combined knowledge check at the end.
  • #9: Now training is very important. But what you need to be able to measure is if that education is changing user behaviour. Are they able to spot more real attacks now, and report them?
  • #10: Well with the Outlook add-in for Phish Threat for enhanced reporting we can do just that. Allowing users to report malicious emails direct from the inbox and passing that data feed to Sophos Email, Endpoint and web security products through SophosLabs.   And also surface that data in Sophos Central.
  • #11: With new Phish Threat reports that allow you to really measure training effectiveness against reports of simulated phishing attacks. To prove effectiveness of training and knowledge retention. As well as providing: At-a-glance campaign stats Measure overall risk level & improvement Measure your organizations awareness
  • #12: And combine that with how quickly users are reporting simulated phishing emails – allowing us to monitor behavior changing from knowing to doing – a really important distinction when combatting real cyber threats.   And I’ll add this is one of a number of reports and dashboards providing insight in organizational, campaign and individual behavior.