Free Phishing Assessment

MDM Technologies has developed a methodology specifically geared towards the global pandemic and the risks facing South African organisations today.

 

Phishing is a cyber-attack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need such as; A request from their bank, for instance, or a note from someone in their company – and to click a link or download an attachment

 

Our unique phishing infrastructure, phishing software and Command & Control (C&C) will be tweaked on a per assessment basis in order to simulate real world phishing attacks and try bypass the layered security infrastructure of the targeted organisation

 

 

Phishing Risks in South Africa

  • 94% of malware is delivered via email
  • Phishing attacks account for more than 80% of reported security incidents
  • Phishing emails account for 9 out of 10 successful cyber-attacks

 

 

Our Free Phishing Test

MDM Technologies offers a free Proof of Concept (POC) on our Phishing Tests.

 

We believe that you should not waste time and money on a Phishing Test unless its first proven to be required. We believe that if we unable to ‘hook’ users into our phishing
test, or unable to bypass the layered security the organisation has deployed in order to prevent this type of attack, then the organisations cyber risk rating for falling victim a phishing attack is low.

Phishing Testing Packages

Pure Phishing Test – Essentials

  • A unique spoofed email
  • A unique spoofed email that bypass’s the layered security of the organisation
  • See which user(s) read, clicked on the link and downloaded our software.
  • A report which will include our recommendations

 

 

 

Phishing & Penetration Test – Recommended

  • A unique spoofed email
  • A unique spoofed email that bypass’s the layered security of the organisation
  • See which user(s) read, clicked on the link and downloaded our software.
  • We will try gain access to the users machine and thus corporate network. We will be able to execute commands on the users machine
  • A report which will include our recommendations