Interactive training explaining what is phishing and providing examples of the different types of phishing. Phishing techniques such as deceptive e-mails and web sites, tab-nabbing, are discussed. Guidelines are provided to help spot the most advanced phishing attempts (e.g., IACS’s Human Life Loss). Be aware, and save lives!
PHISHING SILUMATIONS
Did you know that 91% of successful data breaches and incidents started with phishing attack? Our real-life phishing simulations help you assess the percentage of your employees who are Phish-able, and see how you stack up against industry standards. Customized consequence-based damage phishing simulations are also available.
PHISHING / SPEAR-PHISHING / WHALING DEFENSE
Using high-fidelity machine learning and techniques to continuously fight phishing attacks and stop phishing emails before they hit your inbox. With traditional Phishing security controls, about 25% of attacks get past them. Do not take a chance and protect the 60 seconds window where the first click takes down your critical services and, in some cases, human life.
24 / 7 EMERGENCY INCIDENT RESPONSE
FOR IMMEDIATE ASSISTANCE
(+1) 833-91-CYBER
pscd-csoc-cirt / at / pmscada / dot / ca
PM SCADA Cyber Defense’s CIRT (Cyber Incident Response Team) is comprised of key technical and support team experts with knowledge of different specialized cyber expertise fields who have been trained, certified, and participated in global incident response and handling including government CERTs, providing you with an immediate, effective and orderly response to threats such as malicious adversaries, malicious code propagation, service availability disruption, breaches, and ongoing targetted attacks.