icon

Cybersecurity

In recent years, IT has become the lifeline of every business. It is impossible to imagine life without IT and organizations cannot operate without it. With the increase in the (decentralized) use and importance of IT, digital security is subject to many changes. Malicious hackers are creative and make clever use of new technology, which means that organizations are continuously faced with new challenges to secure their business.

An additional challenge is that hackers are automating and outsourcing their work. As a result, anyone and any organization, regardless of their size, has become a target. Only after the ransomware has spread throughout the organization is it examined how best to extort the company and what redemption is just affordable for the organization. By the time the ransomware has been activated, it is actually too late. The support required in an incident response is so costly that it is a financial noose for any organization. It is therefore vital that basic prevention is in place. PLTFRM and its partners have a solution for every type of organization and can independently advise on the approach that fits best.

Our advice is to always start with a security scan. Depending on the outcome, you then build a security mesh from the following categories:

  • Security audit & testing: An audit or scan to determine where you stand as an organization and which actions still need to be taken. The trusted PLTFRM partners help organizations with this first step and can also support the subsequent steps for implementation, risk assessment, testing, compliance and audits.
  • Ransomware: The PLTFRM partner network supports customers with preventive measures, detection, response/response (in case of an incident) and alerting services. Regardless of whether the organization is at the beginning of the security issue or already has the basics in place and wants to take the next step, from the PLTFRM network of specialist partners we can support the workplace, the network and the data center to improve security.
  • Application security: In addition to securing the workplace and the data center, application security is equally important. This takes place by identifying and monitoring vulnerabilities in applications. PLTFRM partners are able to advise and perform application scans & monitoring, minimizing the number of vulnerabilities.
  • Network Security: All communication between the data center, the workplace and the cloud goes over the network. It is therefore important to secure this critical component properly. PLTFRM partners can help identify, secure, alert and monitor the (software defined) network. For services such as network intrusion detection, secure DNS and Security Operations Center (SOC) you can turn to PLTFRM.

Results: 3 Services

Size

10

Services

PLTFRM services

3

Phishing Campaign

Categorie: Security Awareness

Phishing is one of the most common forms of cybercrime targeting employees of organisations. The goal of phishing is to obtain sensitive information such as usernames and passwords, credit card details, personal information, and other confidential data. Phishing attacks are often carried out through emails but can also occur in the form of phone calls, SMS messages, and social media messages.

Phishing campaigns are designed to raise awareness among an organisation's employees through the simulation of realistic phishing attacks. This is done by creating fake emails that resemble real phishing attacks. The fake emails are then sent to employees within the organisation. The aim is to educate employees on how phishing attacks work and how to protect themselves against them.

A CyberAnt phishing campaign helps organisations test employees' cyber resilience and increase employees' awareness. The service consists of various stages, including planning the campaign, creating fake emails, sending the emails, and reporting the results.

During the campaign planning phase, objectives are established, and it is decided which employees within the organisation will participate in the phishing campaign.

Next, the fake emails are drafted. These should look as realistic as possible to increase the likelihood of successful phishing attacks. For example, the emails may appear to come from a familiar organisation, such as a bank, or from a major supplier. The fake emails often contain links to fake websites where employees are asked to enter login details or other confidential information.

The fake emails are then sent to the selected employees. It is important to send the fake emails at a time when employees can actually open and read them. After sending the emails, the responses from employees are monitored. If employees click on links or enter login details, this is recorded.

At the end of the campaign, a report is prepared with the results. This report provides insight into employees' responses to the fake emails and shows which employees were susceptible to the phishing attacks. The report also includes recommendations for improving employees' security awareness.