Wombat Helps Enterprises so Employees aren't Caught in a 'Smishing' Expedition

By Peter Bernstein February 19, 2013

I like to believe that it is very good for our health if we learn something new every day. Well, today I learned a new word thanks to Wombat Security Technologies, and that word is “SMISHING.” With the caveat that learning about bad things is not actually a bad thing, what you need to know about smishing is that it the text messaging version of “phishing”—the nasty piece of business where someone tries to lure you via e-mail to divulge your personal information so they can use it for various malicious purposes.

Texters beware!

Wombat has introduced SmishGuru, which is being promoted as, “the industry's first and only simulated attack service to target the growing problem of text message phishing, coined as ‘smishing.’” This is not an insignificant problem; as might be expected, the proliferation of bring your own device (BYOD) has increased vulnerability and extended into the mobile workforce.

Wombat has designed SmishGuru as a simulation tool for security officers to train employees on how to recognize and avoid the most subtle yet potentially harmful smishing attacks. And Wombat is no stranger to this space. In fact, SmishGuru is an expansion of Wombat's family of Social Engineering Assessment products, which includes the award winning PhishGuru, an e-mail phishing simulation service.

The goal here is simple: it is the mitigation of BYOD risks through education. As Paula Musich, principal analyst for enterprise security at Current Analysis says, "As more companies embrace BYOD policies to empower employee productivity, cybercriminals will seek new ways to trick people into providing sensitive information making text message phishing or "smishing" one of several attack vectors on smart phones…Text messages, like e-mail messages, can be used to spread malware, phishing scams and other threats among mobile device users."

A look under the hood

So how does SmishGuru work? It is intuitive and powerful. Enterprise security officers can select and customize the type of attacks they want to send and select and customize the training an employee will receive if they fall for the simulated attack. Data from SmishGuru provides security officers with detailed data from each attack campaign. Employees can easily be grouped and assigned additional training in the areas they need it most.

Wombat cites as benefits the fact that by assessing and training employees, the SmishGuru attack simulation service enables security officers to:

  • Mitigate the risk their organization faces due to the use of smartphones
  • Protect corporate networks from malware, spyware and other malicious software
  • Understand which employees are most susceptible and target them with additional training
  • Provide a unique, teachable moment that instructs employees at the point of failure
  • Increase acceptance of security awareness training

 The fact of the matter is – and most people don’t like to admit it – it is likely that at some time, we have all fallen victim to a phishing expedition. I will admit that I fell for a security alert from what appeared to be a financial capability I use, and just a few seconds after I hit send, knew I had been had. Plus, what took seconds to create took months to undo completely.

Through its ability to simulate attacks, Wombat has developed a track record that demonstrates how important an educated consumer is to risk management in the enterprise. In fact, not only do simulations work in reducing employee susceptibility to the allure offered by the bad guys, but simulation has also been shown to increase employee interest in taking more in-depth training.




Edited by Allison Boccamazzo
SHARE THIS ARTICLE
Related Articles

ITEXPO's IBM Keynoter: AI is Here Today

By: Paula Bernier    2/20/2018

Many folks think the artificial intelligence is something we'll see in the future. That's true. AI will be employed in a broader variety of more sophi…

Read More

The Blockchain Event Draws a Crowd

By: Paula Bernier    2/20/2018

The Blockchain Event in Fort Lauderdale draws a crowd, offers some answers, and raises lots of interesting questions. Why have some cryptocurrencies g…

Read More

Hughes: WAN Optimization Expertise, Homegrown Solution Differentiate SD-WAN

By: Paula Bernier    2/16/2018

The SD-WAN marketplace is a crowded one. But Hughes Network Systems says it brings unique expertise and proven technology to the table. And that, Jeff…

Read More

Juniper Security Expert: Behavior Analytics Helps Address Threat Complexity

By: Paula Bernier    2/16/2018

Organizations are changing their cybersecurity strategies, says Juniper Networks Cybersecurity Strategist Nick Bilogorskiy, who presented the closing …

Read More

Welbitz Wins ITEXPO's Idea SHOWCASE

By: Paula Bernier    2/16/2018

It was a sweep. Both the audience and the judges at ITEXPO's IDEA Showcase Thursday picked Welbitz as the winner. The company went up against fellow s…

Read More