Wombat Helps Enterprises so Employees aren't Caught in a 'Smishing' Expedition

By

I like to believe that it is very good for our health if we learn something new every day. Well, today I learned a new word thanks to Wombat Security Technologies, and that word is “SMISHING.” With the caveat that learning about bad things is not actually a bad thing, what you need to know about smishing is that it the text messaging version of “phishing”—the nasty piece of business where someone tries to lure you via e-mail to divulge your personal information so they can use it for various malicious purposes.

Texters beware!

Wombat has introduced SmishGuru, which is being promoted as, “the industry's first and only simulated attack service to target the growing problem of text message phishing, coined as ‘smishing.’” This is not an insignificant problem; as might be expected, the proliferation of bring your own device (BYOD) has increased vulnerability and extended into the mobile workforce.

Wombat has designed SmishGuru as a simulation tool for security officers to train employees on how to recognize and avoid the most subtle yet potentially harmful smishing attacks. And Wombat is no stranger to this space. In fact, SmishGuru is an expansion of Wombat's family of Social Engineering Assessment products, which includes the award winning PhishGuru, an e-mail phishing simulation service.

The goal here is simple: it is the mitigation of BYOD risks through education. As Paula Musich, principal analyst for enterprise security at Current Analysis says, "As more companies embrace BYOD policies to empower employee productivity, cybercriminals will seek new ways to trick people into providing sensitive information making text message phishing or "smishing" one of several attack vectors on smart phones…Text messages, like e-mail messages, can be used to spread malware, phishing scams and other threats among mobile device users."

A look under the hood

So how does SmishGuru work? It is intuitive and powerful. Enterprise security officers can select and customize the type of attacks they want to send and select and customize the training an employee will receive if they fall for the simulated attack. Data from SmishGuru provides security officers with detailed data from each attack campaign. Employees can easily be grouped and assigned additional training in the areas they need it most.

Wombat cites as benefits the fact that by assessing and training employees, the SmishGuru attack simulation service enables security officers to:

  • Mitigate the risk their organization faces due to the use of smartphones
  • Protect corporate networks from malware, spyware and other malicious software
  • Understand which employees are most susceptible and target them with additional training
  • Provide a unique, teachable moment that instructs employees at the point of failure
  • Increase acceptance of security awareness training

 The fact of the matter is – and most people don’t like to admit it – it is likely that at some time, we have all fallen victim to a phishing expedition. I will admit that I fell for a security alert from what appeared to be a financial capability I use, and just a few seconds after I hit send, knew I had been had. Plus, what took seconds to create took months to undo completely.

Through its ability to simulate attacks, Wombat has developed a track record that demonstrates how important an educated consumer is to risk management in the enterprise. In fact, not only do simulations work in reducing employee susceptibility to the allure offered by the bad guys, but simulation has also been shown to increase employee interest in taking more in-depth training.




Edited by Allison Boccamazzo
Get stories like this delivered straight to your inbox. [Free eNews Subscription]
SHARE THIS ARTICLE
Related Articles

Can Science Outsmart Deepfake Deceivers? Klick Labs Proposes an Emerging Solution

By: Alex Passett    3/25/2024

Researchers at Klick Labs were able to identify audio deepfakes from authentic audio recordings via new vocal biomarker technology (alongside AI model…

Read More

Top 5 Best Ways to Integrate Technology for Successful Project-Based Learning

By: Contributing Writer    3/19/2024

Project-based learning, also popularly known as the PBL curriculum, emphasizes using and integrating technology with classroom teaching. This approach…

Read More

How to Protect Your Website From LDAP Injection Attacks

By: Contributing Writer    3/12/2024

Prevent LDAP injection attacks with regular testing, limiting access privileges, sanitizing user input, and applying the proper encoding functions.

Read More

Azure Cost Optimization: 5 Things You Can Do to Save on Azure

By: Contributing Writer    3/7/2024

Azure cost optimization is the process of managing and reducing the overall cost of using Azure. It involves understanding the resources you're using,…

Read More

Massive Meta Apps and Services Outage Impacts Users Worldwide

By: Alex Passett    3/5/2024

Meta's suite of apps and services are experiencing major global outages on Super Tuesday 2024.

Read More