Secure IT icon

USER DEFENCE

Increase Cybersecurity Awareness To Protect Your Organization Against Cyber Attacks

Secure ITUser Defence is a suite of security services that are specifically tailored to empower your employees to become the first line of defence against cyber-attacks. The services include ready to implement comprehensive cybersecurity awareness training, simulated phishing attacks to test employee knowledge and real time dark web intelligence tools that hunt for leaked user credentials. Track and measure performance using regular user defence reports that demonstrate the overall cybersecurity posture of your employees.

Move Past Simple Protection

Our Value Added Benefits

SIEM

SECURITY INFORMATION & EVENT MANAGEMENT
Our SIEM system uses sophisticated machine learning to determine if a threat is taking place by analyzing security events within your environment for remediation.

Containment

SECURITY OPERATIONS CENTRE
A team comprised of security experts that fight more advanced threats in real time.

NOC

NETWORK OPERATIONS CENTRE
A team comprised of live agents who monitor all security alerts within our customer’s infrastructure, including those within the SIEM.

Cybersecurity Training

Our proven model of training is an ongoing service that ensures all new and existing employees are kept up-to-date with the latest attack trends. Instill best practices within your employees to help them navigate an ever-changing threat landscape. Receive access to online self-paced user cyber security training and reference material. Easily track users who have completed the training and their evaluation.

group of mature adult students in class working
q a or questions and answers concept selective

Test Employees with Targeted Simulated Phishing

Expose your employees to the latest simulated phishing traps to help them detect and avoid these kinds of threats. Simulate common phishing threats by simply choosing from more than 1,000 ready-made templates that can be customized for groups or departments. Track the results and redirect employees to training videos to reinforce best practices and improve knowledge.

Detect Compromised Credentials

Proactive monitoring for stolen and compromised employee data on the dark web allows us to detect when a problem arises and before a major breach occurs. Leading-edge detection tools will hunt the dark web for stolen or leaked credentials and report back when detected. If compromised credentials are detected, our team will help you understand the severity of the compromise and provide recommendations for remediation.

mobile phone in female hands with screen showing alert
man use calculators and documents that calculate

Turnkey and Fixed Cost

Easily integrate our product platform into your current environment. We will set up all the software, licensing, installation, and operations required to deliver the services. Receive user training, phishing simulation, and credential detection together in one bundle for a fixed monthly cost.

Digital Risk Protection. Solved.

Gain powerful protection against today’s biggest cybersecurity threats when you choose to defend your systems and data with our innovative digital risk protection solutions.

Additional Benefits of Secure IT User Defence

IMPROVE CYBER BEHAVIOUR

Encourage employees to improve their cyber habits with scheduled phishing tests that can be staggered amongst users to reduce group detection.

TEST EMPLOYEES

Test your employees’ cyber knowledge and help them gain the cyber skills they need to protect themselves and your business.

PROTECT CREDENTIALS

Detect stolen credentials on the dark web in real time so that you can act before they are maliciously used by threat actors.

TRACK RESULTS

Receive a monthly report on leaked credentials, the status of the cyber training and results of simulated phishing activities.

ENGAGE EMPLOYEES

Our training videos are short, easy to understand and end with an online quiz to verify an employee’s retention of the training content.

STAY UPDATED

Training topics and simulated phishing templates are consistently updated to reflect the latest cyber threat landscape and targeted phishing threats.

Frequently Asked Questions

How are the stolen or exposed credentials found on the dark web?

The dark web monitoring aspect of the solution focuses on cyber threats that are specific to our clients’ environments. We monitor the dark web and the criminal hacker underground for exposure of our clients’ credentials to malicious individuals. We accomplish this by looking specifically for our clients’ top level email domains. When a credential is identified, we harvest it. While we harvest data from typical hacker sites like Pastebin, a lot of our data originates from sites that require credibility or a membership within the hacker community to enter. To that end, we monitor more than 500 distinct Internet relay chatroom (IRC) channels, 600,000 private websites, 600 Twitter feeds, and execute 10,000 refined queries daily.

Where do we find these compromised data?

  • Dark Web Chatroom: compromised data discovered in a hidden IRC;
  • Hacking Site: compromised data exposed on a hacked website or data dump site;
  • Hidden Theft Forum: compromised data published within a hacking forum or community;
  • P2P File Leak: compromised data leaked from a Peer-to-Peer file sharing program or network;
  • Social Media Post: compromised data posted on a social media platform;
  • C2 Server/Malware: compromised data harvested through botnets or on a command and control (C2) server.

Can I track personal email accounts for compromises?

We allow for up to five  personal email addresses per organization to be tracked, in addition to all emails on the company domain.

We already have two factor authentication, why do I need this service?

Although most web services require two-factor authentication (2FA), the strength and security vary. It’s easy for hackers to bypass weaker implementation by intercepting codes or exploiting account recovery systems. Most of the problems center around the fact that if you break through anything next to the 2FA login, (account-recovery process, trusted devices, or underlying carrier account) hackers are into the system anyway. The weakest point for 2FA is the wireless carrier (who can be breached) and the mobile device (which can be hacked).

Are there region-based phishing campaigns available?

Yes, there are simulated regional phishing campaigns available and in different languages. There are over 1,000 templates available with new ones added weekly to simulate the latest types of threats. If a user fails the simulated phishing test, they are redirected to online training. There are more than 12 modules available to help reinforce best practices and help them avoid phishing attacks in the future. Reports are available for each part of the solution to provide organizations with insights into user behaviour. Identify trends in user performance while tracking their progress. Use this data to determine knowledge gaps and establish a baseline for improvement.

Related Solutions

Monitoring and Management Solutions Icon

Monitor IT™ Endpoint with Patching

Eliminate service disruptions by managing your it endpoints.

Mail Security Icon

Consult IT™

Professional services designed and implemented by a team of certified experts.

Endpoint Detection and Response Icon

Secure IT EDR

Prevents threats at faster speed, greater scale, and higher accuracy than humanly possible.

Solutions to Grow Your Business

We've got you covered with our comprehensive portfolio of solutions.

Cybersecurity Solutions

Cyber Incident ​Response
Endpoint Detection and Response (EDR)
Extended Detection and Response (XDR)
Firewall Security
Mail Security
Penetration Testing Services
Security Baseline Assessment
User Defence
Vulnerability Detection Response (VDR)
Wi-Fi Security

Backup & Recovery Solutions

Hybrid Backup
Enterprise Backup
Mail Archiving

Helpdesk & Field Services Solutions

Monitoring and Management Solutions

Professional Services & Consulting Solutions

Public and Private Cloud Solutions

Azure Management and Monitoring
Microsoft 365 Administration
Private Cloud
Microsoft CSP

Your partner in digital transformation

Helping the next generation of MSP and IT solution providers transform and grow.

businessmans handshake

Types of Partners

Managed Services Provider (MSP)

Internet Service Provider (ISP)

Value Added Reseller (VAR)

businessmans handshake

Partnership Overview

Jolera’s partner program offers flexibility to engage with us on your terms. We have spent more than two decades building award-winning best in class partner enablement and turnkey end-customer solutions for you.
progress

Partner Program

Jolera has three partner programs to choose from: Select, Preferred and Premier.

Learn about us and the legacy we have created

At Jolera, we treat each MSP partner with specialized care. With more than 20 years of IT experience, we offer the latest technology to navigate cloud, security, endpoint, and storage needs.

vintage pocket watch vintage background concept

About Us

Jolera is widely recognized as a global managed services leader. We started as managed services provider over 20 years ago and have been at the forefront of managed services innovation ever since.

progress

Our People

As a service provider our main goal is to make the customer happy. For that final goal, we need passionate and happy people working with us – Our People Are Our Biggest Asset.

progress

Our Leaders

We are performance driven at the core - tying together best of breed technology and industry leading expertise with pragmatic processes built to deliver outcomes.

Meet Our Leaders!