Phishing IT Security

Phishing

Our experts will help you to recognise and avoid phishing attacks.

What is Phishing?

Phishing is a scamming method by which criminals attempt to obtain confidential information such as usernames, passwords and credit card details by posing as trustworthy sources. This fraud is usually carried out via emails, fake websites or messages that look deceptively similar to the legitimate communication channels of well-known companies.

The attackers send messages designed to appear to come from trusted sources such as banks or well-known online services. These messages often contain links to fake websites that look very similar to the companies’ real sites. As soon as users enter their information on these fake sites, it is intercepted and misused by the fraudsters.

Phishing can also be carried out via text messages, phone calls or other digital means of communication, whereby the fraudsters try to gain the trust of the victims and get them to disclose sensitive information. To protect yourself from phishing, it is important to be suspicious of unexpected messages and to carefully check the authenticity of links and senders before responding.

Recent examples of phishing attacks can be found on this page of the Federal Office for Information Securitygefunden werden.

 

What are the different types of phishing?

Phishing IT Security

E-Mail-Phishing

The attacker sends an email that looks like it comes from a trusted source, such as a bank or online service. The email often contains a link to a fake website that looks like the company’s real website, where the user is then asked to enter their login credentials.
Phishing IT Security

Spear-Phishing

This is a more targeted form of phishing where the attacker uses specific information about the victim to make the phishing message appear more credible. These messages are often personalised and refer to known details about the victim.
Phishing IT Security

Whaling

A special form of spear phishing that focuses on high-ranking managers or other important people within an organisation. The attacker attempts to gain access to sensitive information or financial resources through these targeted attacks.
Phishing IT Security

Smishing

Phishing via SMS messages. The attacker sends an SMS containing a link to a fake website or telephone number that is intended to trick the user into disclosing sensitive information.
Phishing IT Security

Vishing

Phishing via telephone calls. The attacker pretends to be a trustworthy source and tries to get the victim to disclose sensitive information over the phone.
Do you still have questions or are you unsure about certain points? No problem! We will help you gain clarity!

What are frequent attack scenarios?

Microsoft Teams

Outlook

Zoom

WebEx

Microsoft Updates

Citrix

Google Meet

Internal attacks

This is how we help you achieve your goal:

Initialisierung

Festlegung des Geltungsbereich

Informationen

- Leitfaden zu Phishing-Kampagnen
- Unternehmen besser kennenlernen
- Mögliche Angriffsvektoren besprechen
- Festlegen von Angriffszeiträumen

Aufbau

Aufbau und Durchführung

Aufbau

- Aufbau der Angriffe
- Spamtests durchführen
- 1. Angriff mit Berichterstattung
- 2. Angriff mit Berichterstattung

Halbzeit

Analyse des Ist-Zustandes

Halbzeit

- Vorstellen des Ist-Zustandes
- 3. Angriff mit Berichterstattung
- 4. Angriff mit Berichterstattung

Abschluss

Vorstellen des End-Zustandes

Abschluss

- Abschlussreport
- Weitere Maßnahmen besprechen

Our customers

I was collaborating with machCon for a large scale project and was absolutely satisfied with the performance. The Project Manager did a great job & socialized smoothly with the whole team.
Highly skilled Project Managers
Sandoz International GmbH
I was collaborating with machCon for a large scale project and was absolutely satisfied with the performance. The Project Manager did a great job & socialized smoothly with the whole team.
Highly skilled Project Managers
Sandoz International GmbH
I have to say that I totally love working together with machCon – They have very good Project Managers & Coordinators as well as great Business Analysts and Technical Experts.
machCon is like TopGun’s Maverick!
Roche Pharma Research IT
I have to say that I totally love working together with machCon – They have very good Project Managers & Coordinators as well as great Business Analysts and Technical Experts.
machCon is like TopGun’s Maverick!
Roche Pharma Research IT
I’m absolutely happy to have machCon onboard within my projects. They have an incredible drive and are solution oriented while keeping a friendly and positive working atmosphere
Fantastic Business Analysts!
Novartis Pharma AG
I’m absolutely happy to have machCon onboard within my projects. They have an incredible drive and are solution oriented while keeping a friendly and positive working atmosphere
Fantastic Business Analysts!
Novartis Pharma AG

Contact person

Contact us for further information

ZDRAVKO MATIC

IT-Security Consultant

Christian Herbst - CEO