{"id":6312,"date":"2022-05-18T16:47:14","date_gmt":"2022-05-18T08:47:14","guid":{"rendered":"https:\/\/www.cloudfall.cn\/?page_id=6312"},"modified":"2022-12-28T11:56:42","modified_gmt":"2022-12-28T03:56:42","slug":"phishone","status":"publish","type":"page","link":"https:\/\/www.cloudfall.cn\/en\/?page_id=6312","title":{"rendered":"Phishone"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/p2.ssl.qhimg.com\/t01cb832398941f6979.jpg\" alt=\"\" width=\"739\" height=\"381\"\/><\/figure><\/div>\n\n\n<p class=\"has-medium-font-size\" style=\"font-style:normal;font-weight:300\"><strong>Numbers<\/strong><\/p>\n\n\n\n<p>91% of all data breaches start with phishing<br>the average time to discover a data breach was 146 days<br>The average time to process a data breach is 84 days<br>The average loss to a global enterprise from a data breach is $4,000,000.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-text-align-right has-very-dark-gray-color has-very-light-gray-background-color has-text-color has-background has-small-font-size\" style=\"font-style:normal;font-weight:300\"> As we rely more and more on technology to combat today&#8217;s evolving cyber threats, the most important factor &#8211; people &#8211; is easily overlooked. Phishing attacks target people, that is, corporate employees, and 92% of those working in the information industry use email. The attacker is looking for those who are most likely to be trapped. And our products focus on people as the last line of defense, and help enterprises and organizations train internal personnel with targeted security awareness through drill simulation.&nbsp;                                                                   \u2014\u2014 Guard the last line of defense<\/p>\n\n\n\n<p>                <\/p>\n\n\n\n<h3 class=\"has-medium-font-size wp-block-heading\" style=\"font-style:normal;font-weight:300\">The weakest link is the top priority for security defense<\/h3>\n\n\n\n<p>Users remain the easiest target for attackers in most organizations&#8217; cybersecurity defenses, but trained phishing-aware employees can serve as an effective firewall against such threats.<\/p>\n\n\n\n<p>PhishOne simulates a range of phishing attack types to help you identify areas of weakness in your enterprise security, allowing users to strengthen your enterprise defenses through training.<\/p>\n\n\n\n<p>   <\/p>\n\n\n\n<h3 class=\"has-medium-font-size wp-block-heading\" style=\"font-style:normal;font-weight:300\">Product Highlights<\/h3>\n\n\n\n<ul style=\"font-size:15px;font-style:normal;font-weight:300\"><li>Over 50 phishing email templates on the latest and hottest topics, with free editing capabilities<\/li><li>End-user personalized training for simulated attacks<\/li><li>Multi-dimensional data collection for simulated attack drills<\/li><li>Visual display of risk levels and user performance<\/li><li>Detailed drill data reports and graphical reports<\/li><\/ul>\n\n\n\n<h4 class=\"has-text-align-center wp-block-heading\" style=\"font-style:normal;font-weight:300\">Pre-defined editable templates<\/h4>\n\n\n\n<p style=\"font-size:15px;font-style:normal;font-weight:300\">More than 50 popular topics of phishing email attacks can be simulated, and supported custom editing of selected templates.<\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.cloudfall.cn\/wp-content\/uploads\/2019\/06\/\u56fe\u7247-1.png\" alt=\"\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.cloudfall.cn\/wp-content\/uploads\/2019\/06\/\u56fe\u7247-2.png\" alt=\"\"\/><\/figure>\n<\/figure>\n\n\n\n<h4 class=\"has-text-align-center wp-block-heading\" style=\"font-style:normal;font-weight:300\">Training Content Customization Module<\/h4>\n\n\n\n<p>The training content is tailored to meet the customer&#8217;s organizational guidelines and concerns, and can be modified and adjusted by the customer at any time.<br>In-depth reports provide more in-depth information at the enterprise or individual user level, bringing a new understanding of enterprise security.<\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-3 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.cloudfall.cn\/wp-content\/uploads\/2019\/06\/\u56fe\u7247-3.png\" alt=\"\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-id=\"1554\" src=\"http:\/\/www.cloudfall.cn\/wp-content\/uploads\/2019\/06\/\u56fe\u7247-4.png\" alt=\"\" class=\"wp-image-1554\"\/><\/figure>\n<\/figure>\n\n\n\n<h4 class=\"has-text-align-center wp-block-heading\" style=\"font-style:normal;font-weight:300\">Multi-dimensional data collection<\/h4>\n\n\n\n<p style=\"font-size:15px;font-style:normal;font-weight:300\">Not only were the phishing email templates themselves defined with relevant threat types and attack type attributes, but the participants in the simulation exercise were also given certain attributes, and PhishOne captured the following data to provide a valid and comprehensive assessment for the client organization.<\/p>\n\n\n\n<ul style=\"font-size:15px;font-style:normal;font-weight:300\"><li>Participants check the timestamp of simulated attack emails<\/li><li>Where the participants are located<\/li><li>Length of time participants have been in the training<\/li><li>Geolocation of participants<\/li><li>Type of equipment used by the participants<\/li><\/ul>\n\n\n\n<h4 class=\"has-text-align-center wp-block-heading\" style=\"font-style:normal;font-weight:300\">Comprehensive reporting<\/h4>\n\n\n\n<p style=\"font-size:15px;font-style:normal;font-weight:300\">The report module provides the display and download function of visual reports, and the download function of detailed data tables for each exercise activity is also provided in the exercise list, so that a comprehensive exercise result can be displayed through a series of reports:<\/p>\n\n\n\n<p>   <\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" src=\"http:\/\/www.cloudfall.cn\/wp-content\/uploads\/2019\/06\/\u56fe\u7247-5.png\" alt=\"\" class=\"wp-image-1556\"\/><figcaption> <br> Visual reports show multidimensional data<\/figcaption><\/figure><\/div>\n\n\n<h4 class=\"has-text-align-center wp-block-heading\" style=\"font-style:normal;font-weight:300\">Comprehensive dashboard display<\/h4>\n\n\n\n<p style=\"font-size:15px;font-style:normal;font-weight:300\">Demonstrate a real return on investment by understanding the security health of your organization with on-demand, intuitive dashboard results The PhishOne dashboard provides an overview of activity results on user vulnerability, allowing you to measure the overall risk level of your entire user group with real-time awareness factor data, including:<\/p>\n\n\n\n<ul style=\"font-size:15px;font-style:normal;font-weight:300\"><li>Annual Exercise Overview<\/li><li>Participant distribution hot zone<\/li><li>Status of drills to be executed<\/li><li>Exercise Type Statistics<\/li><li>Participant Status Statistics<\/li><\/ul>\n\n\n\n<h4 class=\"has-text-align-center wp-block-heading\" style=\"font-style:normal;font-weight:300\">Easily enabled<\/h4>\n\n\n\n<p style=\"font-size:15px;font-style:normal;font-weight:300\">PhishOne runs entirely in a web browser and is very convenient. To ensure successful delivery of PhishOne emails, simply whitelist the email addresses and domains used in PhishOne campaigns. The list of users is then easily imported via a CSV file. Once the users are uploaded, you are ready to send your first campaign.<\/p>\n\n\n\n<p style=\"font-size:15px;font-style:normal;font-weight:300\">Sample Fishing Awareness Simulation Exercise Report.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img decoding=\"async\" loading=\"lazy\" src=\"http:\/\/www.cloudfall.cn\/wp-content\/uploads\/2020\/04\/\u90ae\u4ef6\u5b89\u5168\u610f\u8bc6\u62a5\u544a.png\" alt=\"\" class=\"wp-image-4457\" width=\"248\" height=\"239\"\/><\/figure><\/div>\n\n\n<p style=\"font-style:normal;font-weight:300\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Numbers 91% of all data breaches start with phishingthe [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=\/wp\/v2\/pages\/6312"}],"collection":[{"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6312"}],"version-history":[{"count":3,"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=\/wp\/v2\/pages\/6312\/revisions"}],"predecessor-version":[{"id":6597,"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=\/wp\/v2\/pages\/6312\/revisions\/6597"}],"wp:attachment":[{"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6312"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}