skip to Main Content

At The Identity Organisation, we're here to help!

If you have any questions, just contact us by mail or phone and a member of our team will be in contact with you.

Contact Us Anytime

Our ears and inbox are always open (or at least Monday-Friday, from 9am-5pm).

Mercury House
19-21 Chapel Street, Marlow,
Bucks, SL7 2HN

+44 (0) 1628 308038
info@tidorg.com

    Your privacy is important to us, and we want to communicate with you in a way which has your consent and which is in line with UK Law on data protection. As a result of a change in UK law on 25th May 2018, by providing us with your personal details you consent to us processing your data in line with current GDPR requirements.

    Here is where you can review our Privacy & GDPR Statement

    To remove consent at any time, please e-mail info@tidorg.com with the word "unsubscribe" as the subject.

    +44 (0) 1628 308038 info@tidorg.com

    Free IT Security Tools

    Test Your Users and Your Network With Our Free IT Security Tools

    As partners of Gartner-leading security awareness firm KnowBe4, we are pleased to be able to offer a number of free tools that will help you manage the IT security problems of social engineering, spear-phishing and ransomware attacks. These tools can be used to test both your users and your network against common attack vectors, related potential vulnerabilities and give you an overview of your current security’s effectiveness.

    In addition, working with the Global Cyber Alliance, we are happy to provide the GCA Cyber Security Toolkit free of charge to SME’s to help them reduce their cyber risk.

    Scroll down for more information and get excellent ammo for more IT security budget!

    Email Exposure Check

    Are any of your organisation’s email addresses exposed on the internet, making you a target for phishing attacks?

    This tool allows you to see which of your corporate email addresses been exposed online, making it easy for cyber criminals to launch social engineering, spear-phishing and ransomware attacks on your organisation. The more email addresses exposed, the higher your risk and the more likely that criminals will leverage this information against you.

    Sign up for this free Email Exposure Check:

    Phishing Security Test

    Did you know that 91% of successful data breaches started with a spear phishing attack?

    Find out what percentage of your users are Phish-prone™ with your free Phishing Security Test. Why? If you don’t do it yourself, the bad guys will. Plus, see how you stack up against your peers with phishing Industry Benchmarks. Start phishing your users now. The Phish-prone percentage is usually higher than you expect and is great ammo to get budget.

    Sign up for this free Phishing Security Test and find out today:

    Phish Alert Button

    Do your users know what to do when they receive a suspicious email?

    Should they call the helpdesk, or forward it? Do they know how to forward it while preserving all headers? Should they just delete it, or forfeit the chance of early warning? This Phish Alert button gives your users a quick and easy way to report suspect emails to your security team – forwarding the email as an attachment with headers intact to you, while simultaneously deleting the mail from the users inbox.

    Try the Phish Alert button free today:

    Weak Password Test

    Did you know 81% of hacking-related breaches used either stolen and/or weak password?

    Are your user’s passwords…P@ssw0rd? Employees are the weakest link in network security, using weak passwords and falling for phishing and social engineering attacks. Our Weak Password Test checks your Active Directory for 10 types of weak password related threats, get your report in 5 minutes!

    Download the Weak Password Test!

    Breached Password Test

    How vulnerable is your network to hacked user passwords?

    A whopping 25% of employees are using the same password for all logins. What if that password is available on the dark web? A massive amount of passwords are compromised due to data breaches and used by the bad guys for attacks. Find out if hacked passwords are being used within your organization.

    This free Active Directory tool can tell if your users are using breached passwords today:

    Mailserver Assessment

    Email is still the number one attack vector. Do you know if hackers can get through your mail filters?

    This Mailserver Assessment tool gives you a quick insight into how your mailserver handles test messages that contain a variety of message types – including attachments with password-protected, macro zipped, .exe files, spoofed domains and more. All test messages are simulated 100% non-malicious.

    Get Your Mailserver Assessment today:

    Domain Spoof Test

    Can hackers spoof an email address of your own domain?

    Are you aware that one of the first things hackers try is to see if they can spoof the email address of your CEO? If they are able to commit “CEO Fraud”, penetrating your network is like taking candy from a baby. This free test allows you to find out if your email server is configured incorrectly, leaving your domain open to spoofed attacks.

    Find out now if your domain can be spoofed:

    Domain Doppelganger

    Discover dangerous look-alike domains that could be used against you!

    Since look-alike domains are a dangerous vector for phishing attacks, it’s top priority that you monitor for potentially harmful domains that can spoof your domain. This tool makes it easy for you to identify your potential “evil domain twins” and combines the search, discovery, reporting, risk indicators, and end-user assessment with training so you can take action now.

    Ransomware Simulator

    Find out how vulnerable your network is against ransomware and cryptomining attacks.

    Cyber criminals are constantly coming out with new versions of ransomware strains to evade detection. Is your network effective in blocking ransomware when employees fall for social engineering attacks? RanSim will simulate 13 ransomware infection scenarios and 1 cryptomining infection scenario and show you if a workstation is vulnerable.

    Second Chance Tool

    Wish your users could “roll back time” when they click a bad link?

    Now they can! Second Chance enables your user to make a smarter security decision by giving them a way to back out of that click. This tool takes an intelligent look at the clicked URL in an email, and asks your user if they are sure they want to do this, in case they clicked on a potentially unsafe or an unknown website.

    Give your users a Second Chance:

    Automated Security Awareness Program (ASAP)

    Get your customized security awareness training program.

    Many IT pros don’t exactly know where to start when it comes to creating a security awareness program that will work for their organization. ASAP allows you to build a customized Security Awareness Program for your organisation that will help you to implement all the steps needed to create a fully mature training program.

    Training Preview

    The world’s largest library of security awareness training content is now just a click away!

    In your fight against phishing and ransomware you can now deploy the best-in-class phishing platform combined with the world’s largest library of security awareness training content; including 800+ interactive modules, videos, games, posters and newsletters. Get access to the full library now!

    Cyber Security Toolkit

    Get your free cyber security toolkit here:

    Phishing Reply Test

     

    Redstore

    Secure controlled access, and sharing of Invalid & Fraudulent Identity, and other documents. Available separately or with: GreenStore – Secure controlled  access, and sharing of validated & checked Identity and other documents for re-use. Full traceability and audit trail.

    Benefits:

    • Data sharing with other organisations for counter fraud
    • No expensive software licence or maintenance cost
    • Traceability with full audit trail

    Get your Redstore now!

    TIO and our partners work together to help businesses reduce their risk of a cyber attack or data breach, by training users how to identify and correctly deal with phishing emails – turning employees from your weakest security link to a human firewall.

    To find out how we can help your industry validate ID, secure your data and minimise fraud whist being GDPR compliant and cyber secure, contact a TIO Consultant.

    Free IT Security Tools

    Back To Top