Sophos Launches Phish Threat Phishing Email Simulator

By Richard Anderson

Leading cybersecurity firm Sophos has announced the launch of a new phishing attack simulation platform. Sophos Phish Threat is billed as the easiest-to-use phishing attack simulator on the market. Sophos claims the platform is easier to deploy, use and manage than any competitor’s product.

Phishing has now become the number one threat to security. Organizations can invest heavily in technical solutions to prevent cyberattacks, only for access to be gained to systems as a result of an employee clocking on a malicious link or opening a malware-infected email attachment.

To mount an effective defense against phishing attacks, organizations must use a combination of technological solutions to block malicious emails and training to improve awareness of the threats. The goal is to implement robust defenses and to develop a security culture – One where all employees stop and think before acting and can distinguish between genuine and malicious emails.

Security training is essential, although organizations should conduct phishing simulations to assess the effectiveness of their training programs. Phishing simulations help employees identify phishing emails in a safe environment, while failures can be turned into a learning opportunity.

Sophos Phish Threat can be set up in minutes, Simulated phishing campaigns can be selected from a list and scheduled for users and user groups.

The platform can be configured to trigger additional training modules for individuals who respond on the phishing emails. Administrators can monitor the results of the campaigns in real time and see the email sent, who responded and who has completed the training modules.

Sophos Phish Threat was developed by Brady Bloxham of Silent Break Security and uses the firm’s Phish Threat platform.

The platform has now been released in the United States and is available through the Sophos Central Admin management console. Sophos plans to extend the platform for use in other regions in the near future.

Twitter Facebook LinkedIn Reddit Link copied to clipboard

Posted by

Richard Anderson

Richard Anderson is the Editor-in-Chief of NetSec.news