Empower your Staff Today!
See how our fully autonomous AI platform will save you time and money by significantly improving your security awareness and phishing training.
We are committed to transforming your team into your best line of defense!
Compliance Escalation
Non-compliant users are flagged, risk-escalated, and sent daily reminders for compliance.
User Customization
Non-Compliant users get a personalized page with pending videos for on-demand training.
MicroTraining Content
Bite-sized training sent directly to users’ inboxes all year.
PCI-DSS
Guidelines for securing payment card data to prevent fraud
CJIS
Covers the security requirements for criminal justice information
HIPAA
Measures to protect health information, ensuring privacy
SOX
Focuses on staying compliant with the Sarbanes Oxley Act
CMMC
Cybersecurity maturity model for defense contractors
FISMA
Federal information security management act
Phishing Simulations are campaigns in which fake “phishing” emails are created based on typical phishing attempts organizations regularly find themselves facing. They are most commonly delivered as part of a security awareness training program and provide the best results for preparing people for a wide range of cybersecurity threats.
1.) Leadership Difference Our CEO Joshua is an ethical hacker, and Our COO is a 30 year CIA veteran. They know from their experience on the other side what is needed!
2. Easy Integration We easily integrate with any tech stack, and can be ready to use right away.
3. Automated Training We utilize AI technology to deliver research backed micro learning experiences to your staff based on their specific risk profile. So, you always know your employees are getting the support they need!
4. Advanced Analytics Our metrics can be viewed at anytime, and are not campaign based. You get constant, Realtime, and holistic view of your company's susceptibility to phishing attacks whenever you need it with our analytics dashboard.
5. Non-Punitive Our Phishing Campaigns, are gamified, and not designed to be used as a tool to identify problematic employees. Our System works by identifying each individuals susceptibilities and delivering training based on our AI's understanding of them. That way its not punitive, but encouraging, and helps the user actually fill in the gaps in their understanding.
Phishing simulations are important because they keep the company informed on two fronts:
1. Simulations keep the employees informed on phishing threats and help them stay vigilant in spotting threats in their inbox.
2. Simulations show the company who in their organization has the highest risk of being phished and it shows what types of attacks they are most vulnerable to….or at least they do if the company is using PhishFirewall.
That kind of education and intelligence ensures that companies can very quickly adapt to the way they handle real threats.
Your Phish Click Rate can be found In your Back office, which you can log into here.
Then You will find User Analytics on the left hand menu.
From that you will see your organizations Overall Phish Click Rate on the Executive Summary Tab.
If you swap over to the Breach Analysis Tab , you will find a graph showing your Phish Click rate on a month by month basis.
Both can be filtered based on Tenant, Location, and Department.
Your Phish Click Rate can be found In your Back office, which you can log into here.
Then You will find User Analytics on the left hand menu.
From that you will see your organizations Engagement Rate on the Executive Summary Tab.
If you swap over to the Education Analytics , you will find a graph showing your Engagement Rate based on Location, or Department.
Of Course, You can find that information in the User Report Card.
You can find User Report Card In your Back office, which you can log into here.
You will find User Analytics on the left hand menu.
From that you will navigate the the User Report Card Tab.
Of Course, You can find that information under User Actions.
You can find User Actions In your Back office, which you can log into here.
You will find User Actions on the left hand menu. This shows you the daily activity, for any 31 day window.
Of Course, You can find that information under User Actions.
You can find User Actions In your Back office, which you can log into here.
You will find User Actions on the left hand menu.
From that you will Select the User Actions Tab.
1. Go to admin.phishfirewall.com and sign in
2. Go to the top right-hand corner and select the dropdown by your name
3. From that you will Select details.
5. Enter The New Admins Email Address
6. Select the Role, Either Admin for access to all Tenants, or Tennant Admin for access to specified Organization.
NOTE: The Admin role has access to all sub-tenants, the Tenant Admin will only have access to the Tennant selected.
7. If you want the Admin to have the ability to manage the Sync Connectors, ensure that new sync access is enabled, leave unchecked if they just need access to the Reported Phishing tool, or Analytics.
8. Select the associated organization for the Admin or Tennant Admin.
9. Click Send Invite, and we will send instructions for account setup to the supplied Email.
You are done!
1. Go to admin.phishfirewall.com and sign in
2. Go to the top right-hand corner and select the dropdown by your name
3. From that you will Select details.
1. Go to admin.phishfirewall.com and sign in
2. Go to the top right-hand corner and select the dropdown by your name
3. From that you will Select Customer Support.
1. Go to admin.phishfirewall.com and sign in
2. Select Reported Phish from the Left Side Menu
3. From that you will see all of the reported emails, that have not been categorized.
4. Click view details next to the desired Email to Open up an expanded view, Now You will be able to see the important, details related to the sender, and the links that are contained.
5. You can Click The Preview Snapshot Email, to view an image of the rendered email.
6. You can select the view Raw File to bring up a file containing the code of the Email, broken down by headings with the ability to copy sections.
7. Now You Will Select Phish, Not Phish, or Spam.
Phish - If the email appears to be malicious.
Spam - If the email appears to be Generic Spam Marketing Content.
Not Phish - If the email appears to be not malicious, or spam.
Based on your response, the end user will receive an email that informs them of the results. It will send a short informational email to help identify Spam, or other non-malicious emails if not a phishing email. And, it will congratulate them for helping protect your organization if they correctly reported a malicious email. This is all done autonomously.