Increase Cybersecurity Awareness To Protect Your Organization Against Cyber Attacks
Secure IT™ User Defence is a suite of security services that are specifically tailored to empower your employees to become the first line of defence against cyber-attacks. The services include ready to implement comprehensive cybersecurity awareness training, simulated phishing attacks to test employee knowledge and real time dark web intelligence tools that hunt for leaked user credentials. Track and measure performance using regular user defence reports that demonstrate the overall cybersecurity posture of your employees.
Move Past Simple Protection
Our Value Added Benefits
SECURITY INFORMATION & EVENT MANAGEMENT
Our SIEM system uses sophisticated machine learning to determine if a threat is taking place by analyzing security events within your environment for remediation.
SECURITY OPERATIONS CENTRE
A team comprised of security experts that fight more advanced threats in real time.
NETWORK OPERATIONS CENTRE
A team comprised of live agents who monitor all security alerts within our customer’s infrastructure, including those within the SIEM.
Our proven model of training is an ongoing service that ensures all new and existing employees are kept up-to-date with the latest attack trends. Instill best practices within your employees to help them navigate an ever-changing threat landscape. Receive access to online self-paced user cyber security training and reference material. Easily track users who have completed the training and their evaluation.
Test Employees with Targeted Simulated Phishing
Expose your employees to the latest simulated phishing traps to help them detect and avoid these kinds of threats. Simulate common phishing threats by simply choosing from more than 1,000 ready-made templates that can be customized for groups or departments. Track the results and redirect employees to training videos to reinforce best practices and improve knowledge.
Detect Compromised Credentials
Proactive monitoring for stolen and compromised employee data on the dark web allows us to detect when a problem arises and before a major breach occurs. Leading-edge detection tools will hunt the dark web for stolen or leaked credentials and report back when detected. If compromised credentials are detected, our team will help you understand the severity of the compromise and provide recommendations for remediation.
Turnkey and Fixed Cost
Easily integrate our product platform into your current environment. We will set up all the software, licensing, installation, and operations required to deliver the services. Receive user training, phishing simulation, and credential detection together in one bundle for a fixed monthly cost.
Digital Risk Protection. Solved.
Gain powerful protection against today’s biggest cybersecurity threats when you choose to defend your systems and data with our innovative digital risk protection solutions.
Additional Benefits of Secure IT™ User Defence
IMPROVE CYBER BEHAVIOUR
Frequently Asked Questions
How are the stolen or exposed credentials found on the dark web?
The dark web monitoring aspect of the solution focuses on cyber threats that are specific to our clients’ environments. We monitor the dark web and the criminal hacker underground for exposure of our clients’ credentials to malicious individuals. We accomplish this by looking specifically for our clients’ top level email domains. When a credential is identified, we harvest it. While we harvest data from typical hacker sites like Pastebin, a lot of our data originates from sites that require credibility or a membership within the hacker community to enter. To that end, we monitor more than 500 distinct Internet relay chatroom (IRC) channels, 600,000 private websites, 600 Twitter feeds, and execute 10,000 refined queries daily.
Where do we find these compromised data?
- Dark Web Chatroom: compromised data discovered in a hidden IRC;
- Hacking Site: compromised data exposed on a hacked website or data dump site;
- Hidden Theft Forum: compromised data published within a hacking forum or community;
- P2P File Leak: compromised data leaked from a Peer-to-Peer file sharing program or network;
- Social Media Post: compromised data posted on a social media platform;
- C2 Server/Malware: compromised data harvested through botnets or on a command and control (C2) server.
Can I track personal email accounts for compromises?
We allow for up to five personal email addresses per organization to be tracked, in addition to all emails on the company domain.
We already have two factor authentication, why do I need this service?
Although most web services require two-factor authentication (2FA), the strength and security vary. It’s easy for hackers to bypass weaker implementation by intercepting codes or exploiting account recovery systems. Most of the problems center around the fact that if you break through anything next to the 2FA login, (account-recovery process, trusted devices, or underlying carrier account) hackers are into the system anyway. The weakest point for 2FA is the wireless carrier (who can be breached) and the mobile device (which can be hacked).
Are there region-based phishing campaigns available?
Yes, there are simulated regional phishing campaigns available and in different languages. There are over 1,000 templates available with new ones added weekly to simulate the latest types of threats. If a user fails the simulated phishing test, they are redirected to online training. There are more than 12 modules available to help reinforce best practices and help them avoid phishing attacks in the future. Reports are available for each part of the solution to provide organizations with insights into user behaviour. Identify trends in user performance while tracking their progress. Use this data to determine knowledge gaps and establish a baseline for improvement.
Monitor IT™ Endpoint with Patching
Eliminate service disruptions by managing your it endpoints.
Professional services designed and implemented by a team of certified experts.
Secure IT™ EDR
Prevents threats at faster speed, greater scale, and higher accuracy than humanly possible.