Test Your Users and Your Network With Our Free IT Security Tools
As partners of Gartner-leading security awareness firm KnowBe4, we are pleased to be able to offer a number of free tools that will help you manage the IT security problems of social engineering, spear-phishing and ransomware attacks. These tools can be used to test both your users and your network against common attack vectors, related potential vulnerabilities and give you an overview of your current security’s effectiveness.
In addition, working with the Global Cyber Alliance, we are happy to provide the GCA Cyber Security Toolkit free of charge to SME’s to help them reduce their cyber risk.
Scroll down for more information and get excellent ammo for more IT security budget!
Email Exposure Check
Are any of your organisation’s email addresses exposed on the internet, making you a target for phishing attacks?
This tool allows you to see which of your corporate email addresses been exposed online, making it easy for cyber criminals to launch social engineering, spear-phishing and ransomware attacks on your organisation. The more email addresses exposed, the higher your risk and the more likely that criminals will leverage this information against you.
Sign up for this free Email Exposure Check:
Phishing Security Test
Did you know that 91% of successful data breaches started with a spear phishing attack?
Find out what percentage of your users are Phish-prone™ with your free Phishing Security Test. Why? If you don’t do it yourself, the bad guys will. Plus, see how you stack up against your peers with phishing Industry Benchmarks. Start phishing your users now. The Phish-prone percentage is usually higher than you expect and is great ammo to get budget.
Sign up for this free Phishing Security Test and find out today:
Phish Alert Button
Do your users know what to do when they receive a suspicious email?
Should they call the helpdesk, or forward it? Do they know how to forward it while preserving all headers? Should they just delete it, or forfeit the chance of early warning? This Phish Alert button gives your users a quick and easy way to report suspect emails to your security team – forwarding the email as an attachment with headers intact to you, while simultaneously deleting the mail from the users inbox.
Try the Phish Alert button free today:
Weak Password Test
Did you know 81% of hacking-related breaches used either stolen and/or weak password?
Are your user’s passwords…P@ssw0rd? Employees are the weakest link in network security, using weak passwords and falling for phishing and social engineering attacks. Our Weak Password Test checks your Active Directory for 10 types of weak password related threats, get your report in 5 minutes!
Download the Weak Password Test!
Breached Password Test
How vulnerable is your network to hacked user passwords?
A whopping 25% of employees are using the same password for all logins. What if that password is available on the dark web? A massive amount of passwords are compromised due to data breaches and used by the bad guys for attacks. Find out if hacked passwords are being used within your organization.
This free Active Directory tool can tell if your users are using breached passwords today:
Email is still the number one attack vector. Do you know if hackers can get through your mail filters?
This Mailserver Assessment tool gives you a quick insight into how your mailserver handles test messages that contain a variety of message types – including attachments with password-protected, macro zipped, .exe files, spoofed domains and more. All test messages are simulated 100% non-malicious.
Get Your Mailserver Assessment today:
Domain Spoof Test
Can hackers spoof an email address of your own domain?
Are you aware that one of the first things hackers try is to see if they can spoof the email address of your CEO? If they are able to commit “CEO Fraud”, penetrating your network is like taking candy from a baby. This free test allows you to find out if your email server is configured incorrectly, leaving your domain open to spoofed attacks.
Find out now if your domain can be spoofed:
Discover dangerous look-alike domains that could be used against you!
Since look-alike domains are a dangerous vector for phishing attacks, it’s top priority that you monitor for potentially harmful domains that can spoof your domain. This tool makes it easy for you to identify your potential “evil domain twins” and combines the search, discovery, reporting, risk indicators, and end-user assessment with training so you can take action now.
Find out how vulnerable your network is against ransomware and cryptomining attacks.
Cyber criminals are constantly coming out with new versions of ransomware strains to evade detection. Is your network effective in blocking ransomware when employees fall for social engineering attacks? RanSim will simulate 13 ransomware infection scenarios and 1 cryptomining infection scenario and show you if a workstation is vulnerable.
Second Chance Tool
Wish your users could “roll back time” when they click a bad link?
Now they can! Second Chance enables your user to make a smarter security decision by giving them a way to back out of that click. This tool takes an intelligent look at the clicked URL in an email, and asks your user if they are sure they want to do this, in case they clicked on a potentially unsafe or an unknown website.
Give your users a Second Chance:
Automated Security Awareness Program (ASAP)
Get your customized security awareness training program.
Many IT pros don’t exactly know where to start when it comes to creating a security awareness program that will work for their organization. ASAP allows you to build a customized Security Awareness Program for your organisation that will help you to implement all the steps needed to create a fully mature training program.
The world’s largest library of security awareness training content is now just a click away!
In your fight against phishing and ransomware you can now deploy the best-in-class phishing platform combined with the world’s largest library of security awareness training content; including 800+ interactive modules, videos, games, posters and newsletters. Get access to the full library now!
Cyber Security Toolkit
The Global Cyber Alliance (GCA) has built this toolkit for small to medium-sized businesses to address the Center for Internet Security Controls (CIS Controls) which will enable business owners to significantly reduce the cyber risks they face every day.
Use the GCA Cybersecurity Toolkit to assess your security posture, implement free tools, find practical tips, and use free resources and guides to improve your company’s cybersecurity readiness and response.
Get your free cyber security toolkit here:
Phishing Reply Test
Did you know that 60% of spoofed e-mails do not include a malicious link or attachment?
When crafted well, most users are likely to fall victim to a highly targeted social engineering attack. This new Phishing Repy Test (PRT) is a complimentary IT tool that makes it easy for you to check to see if key users in your organisation will reply to a highly targeted impersonation attack.
PRT will give you quick insights into how many users will take the bait so you can take action to train your users and better protect your organisation from these fraudulent attacks
Secure controlled access, and sharing of Invalid & Fraudulent Identity, and other documents. Available separately or with: GreenStore – Secure controlled access, and sharing of validated & checked Identity and other documents for re-use. Full traceability and audit trail.
- Data sharing with other organisations for counter fraud
- No expensive software licence or maintenance cost
- Traceability with full audit trail
Get your Redstore now!
TIO and our partners work together to help businesses reduce their risk of a cyber attack or data breach, by training users how to identify and correctly deal with phishing emails – turning employees from your weakest security link to a human firewall.
To find out how we can help your industry validate ID, secure your data and minimise fraud whist being GDPR compliant and cyber secure, contact a TIO Consultant.