Jellyphish has increased our awareness regarding cyber security and given us a great idea about where we stand in today cyber landscape.
Step 1:We Create A Campaign
We work with you to outline the scope of the cyber security awareness test. We create multipal scenarios which aim to test your users response to various attack vectors seen in the current cyber landscape.View Details
Step 2:Customise and design an attack
you then provide us with an email list of your end users using a secure/encrypted third party application and we get to work by customising and targeting the campaign.We send test emails to a few text email address as part of an infrastrure test.Depending on how robust your infrastrcture is, We may need you to configure security policies to whitelist our phishing emails so we get to your end users.View Details
Step 5:Conduct analysis and generate a report
Our analysts will interpret the results of the targeted campaign to get a better understanding of your end users and gain insight into the most effective attack vectors.Results from the analysis will be presented in a report.View Details
Step 6:Schedule Awareness Package
Now you, or your IT security team, can have a better understanding of your end users awareness. You can continue to operate knowing that your end users have been reminded of the threats in the cyber world.This should keep them on their toes until the next cyber awareness text.View Details
Who We are
I’m the founder of the cyber security firm Jellyphish. I’ve been involved in Cyber Security for over 5 years, finding out ways around systems is something I love doing for fun.Over time, I discovered that this could actually become a career. That’s how I found penetration testing. Now the focus of Jellyphish is to spread knowledge I have gathered over time and make the internet a better place by offering Cyber Security Awareness Training.
We’re looking forward to having you onboard!
50+ Projects Delivered
10 + Industry Awards
What will your end user do?
Will your users click on emailed links? What do they do when faced with legitimate looking websites?Are their browsers and plugins updated? Without a cyber security awareness test,this data is absent so your risk level is unknown, but that data is waiting to be collected. Jellyphish provides a great service that helps you determine where your risk lies,and the efficacy of classroom traning.
Classroom training should be the last resort?
Classroom traning has its limits, not least the fact that the techniques taught can be difficult to implement in a user’s normal workflow.Instead,train on the job.Send phishing email that appear in their inbox, and start teaching them how to react with actual phishing mails.Twitter regularly phishes its employees,and you can too (not phish Twitter, that is,but your own employees!) Bonus: after multiple campaigns you’ll have a list of repeat victims who are in need to additional interventions, and the rest of the users don’t need to attend classroom training.
Why We Are Different
There is no greater wealth than wisdom, no greater poverty than ignorance; no greater heritage than culture and no greater support than consultation.