Others
What are the prerequisites for ThreatCop?
1. Add a list of targeted employees in the sample CSV format. (First Name and Email are mandatory parameters, other fields are optional) 2. Whitelist the below-mentioned IPs on the Firewall, Web Applications and on all your gateway solutions : ...
Does your tool provide multilingual awareness and assessment?
Yes, we do provide multilingual simulation and awareness.
How frequently do we get the report?
Our dashboard has the feature of automatically generating reports. The dashboard offers a feature to download the report of the simulation once it is completed. Also, if we're engaged on a quarterly basis, we can share the report of quarterly ...
Where is your product hosted? Is the cloud situated in India?
The product is hosted on AWS. Yes, the cloud is situated in Mumbai, India.
What do you cover in awareness modules?
We share animation videos based on the general awareness scenarios, customized email templates, case studies and infographics about the basics of cyber security.
We are already using a product like this, so why should we use this product?
If that is the case, we would be very grateful to get an opportunity to do a POC for 100-200 employees of your organization so that you can experience ThreatCop in action. This will let you get a feel for how we do simulations and what kinds of ...
What are some of the major indicators of a phishing email to look for?
To spot a phishing email, you should check the domain from which the email has been sent, make sure that the hyperlink inside the email is secure over HTTPS, check the time at which the email reached your inbox and ensure the content is grammatically ...
How do you do your assessment?
We have a gamified assessment that we send to the employees who have gone through simulation and awareness training. It is more focussed on the awareness that we have provided to make it more engaging and interesting.
What are the business models of the tool?
Saas, Saas+Managed Services & In-House
Who are your clients for this product?
Kotak Mahindra Bank Apollo Munich Aditya Birla Capital Birlasoft Drivezy Essel Group Maxlife Insurance Prudent Insurance Brokers PVR Cinemas RBL Bank Utkarsh Small Finance Bank Pine Labs The Himalaya Drug company Ujjivan Small Finance Bank GMR Tech ...
Who are your competitors in this field ?
KnowBe4, Human Firewall, Wombat, Sophos, Iron Scales
What are your USPs ?
Following are the USP's of our product: 1. Learning Management System 2. IAM (Identity Access Management) 3. Tool Localisation 4. Hack Record of Employees 5. Periodic Gamified Assessment (Questions sets will be provided) 6. Employee Vulnerability ...
What is Cyber Scam?
Cyber scam is the crime committed via a computer with the intent to corrupt another individual’s personal and financial information stored online. Cyber scam is the most common type of fraud and individuals and organizations need to be vigilant and ...
What is Vishing?
The fraudulent practice of making phone calls or leaving voice messages purporting to be from reputable companies in order to trick individuals into revealing personal information such as bank details and credit card numbers.
What is Ransomware?
Ransomware is a type of malware from cryptovirology that threatens to publish the victim's data or perpetually blocks access to it unless a ransom is paid. While some simple ransomware may lock the system so that it is not difficult for a ...
The product doesn't fit my budget. Which attack vector should I go for?
You can go for bi-annual phishing simulation along with awareness. We recommend this because 75% of cyber attacks happen because of phishing and it is the easiest medium for hackers to breach an organization.
What is Spear Phishing?
Spear Phishing is a type of social engineering tactic, where an attacker sends a fraudulent email on behalf of a trusted sender to trick a human/employee victim into revealing sensitive information.
What is SMiShing?
A form of Phishing via text messages, SMS . It is a fraudulent practice of sending text messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords or credit card numbers.
What is ROI?
If we talk about ThreatCop, we have worked with a diverse range of organizations from different sectors. We have seen a lot of different types of attacks happening to different organizations and we have a very good amount of experience in this ...
What is Phishing?
Phishing is a type of social engineering where an attacker sends fraudulent emails designed to trick a human victim into revealing sensitive information to the attacker or to deploy malicious software on the victim's infrastructure.
We have the insurance for all the financial losses due to phishing attacks, then why should I choose Threat cop?
There is no such insurance that protects an organization against the financial losses suffered due to phishing attacks.
How do you extract the data provided by Hack record?
We have partnered with various external APIs that fetch this information for us.
What is a hack record?
Hack record is a feature of the tool that allows you to find out if your employee's official email ID has been compromised. It also lists down all the third-party platforms where the ID has been compromised.
What is a social engineering attack?
A technique of hacking that involves mental or emotional manipulation of the victim.
Can you provide us with the details of platforms where our employees are using their official ID?
No, we are looking forward to incorporating this functionality in our upcoming releases. As of now, we only show the data regarding the third-party platforms where the employee's official ID was compromised.
What is the vulnerability level of Kratikall's employees? How secure is your organization?
As per the recent simulation run, less than 2% of Kratikal's employees were hacked. The vulnerability posture is updated after every simulation.
How do you make sure that the employees do not find a way to skip the video?
We have two features to ensure that no employee can skip the video. The first is that no one can fast-forward the video and the second is that the video is paused automatically if anyone tries to change the window.
How do you make sure that employees are going through our LMS modules?
We keep track of all the users' progress while the course is up & running. In addition to this, reminders are sent on a regular basis(by tracking their progress percentage) to ensure that the users complete the course.
How much time will it take in deployment of the product in-house?
It takes around 40 mins to 1 hour to deploy the product once all the arrangements and pre-requisites are in place.
Why does an organization need awareness training?
Every organization needs awareness training because even with the advancement of technology, it is impossible to stop every threat actor from bypassing your company's security tools and protocols. For instance, a firewall or a security gateway ...
Why does an organization need awareness training?
Every organization needs awareness training because even with the advancement of technology, it is impossible to stop every threat actor from bypassing your company's security tools and protocols. For instance, a firewall or a security gateway ...
Is the product in accordance with any security compliance?
Yes, it is in accordance with ISO 27001 compliance.
Does every employee receive the same set of questions?
No, we jumble the questions for every employee.
Is there any defined passing percentage for the assessment of employees?
Yes, a passing percentage can be set for the assessment of employees.
How do you track who opened the email?
Phishing attacks continue to be a serious hazard to both individuals and businesses. Organisations frequently run phishing security tests as part of proactive security measures to determine how vulnerable their staff are to such attacks. Tracking ...
Why should I go for the 3 year engagement policy if you can decrease the threat percentage in one year?
Every year, new employees are added to the organization. Also, with the human's tendency to forget things, regular assessment will allow them to stay aware and cautious so that they can protect themselves and the organization.
Do you provide user-specific awareness?
We have user-specific awareness content in context to our matrix of vulnerability. We give basic awareness training to every employee the simulation has been run on. We also give user-specific instantaneous awareness to those employees who have ...
What is gamification?
ThreatCop has introduced some "Gamification" elements to make learning much more enjoyable and effective. The tool's interface has been made much more engaging and interactive by adding gamified designing elements and offering interesting learning ...
Has any attack ever happened because of employee negligence?
Yes, many. For your reference, Zomato lost the data of 17 million users in a single day. This happened because of the negligence of 1 out of the 5000 employees situated in 63 different cities of India. He was a developer who used his cloud's ...
How do you make sure that the data is secured?
We use RDS for Rest data, which is secured by AES-256 Encryption method. Data in motion is secured by SSL. VAPT of every version is done before the official release of each build.
Next page