

Security Awareness
The Simulated Phishing activity consists of:
- Simulated phishing attacks (Phishing Campaigns): An activity conducted periodically to assess, on an individual basis, the susceptibility of the organization’s staff to this type of attack;
- Corrective Training (Remedial Training): The activity of automatically administering online courses, on an individual basis, to users found to be susceptible to this type of attack.


Simulated Phishing
The Simulated Phishing activity consists of:
- Simulated phishing attacks (Phishing Campaigns): An activity conducted periodically to assess, on an individual basis, the susceptibility of the organization’s staff to this type of attack;
- Corrective Training (Remedial Training): The activity of automatically administering online courses, on an individual basis, to users found to be susceptible to this type of attack.


Dark Web Monitoring
This activity is an automated Ethical Hacking operation that involves monitoring dark web sites to detect possible data exfiltration related to:
- Organizations: monitoring of data exfiltration affecting company personnel caused by cyber supply chain risk, meaning data exfiltration involving one or more individuals or legal entities having relationships with the company;
- Individual information: monitoring aimed at detecting the exfiltration of data (e.g., email addresses) directly connected to the company’s personnel.


Policy Management
The policy management activity will allow the company to simplify the management of compliance requirements by creating an “Audit Trail” of the reading and acceptance of the company’s policies, individually distributing the policies to staff and recording their reading and acceptance, both for existing personnel and integrating it into the onboarding procedure for new personnel. Furthermore, upon the company’s request, it will be possible to develop and later administer comprehension tests on the policies themselves.
The Simulated Phishing activity consists of:
- Simulated phishing attacks (Phishing Campaigns): An activity conducted periodically to assess, on an individual basis, the susceptibility of the organization’s staff to this type of attack;
- Corrective Training (Remedial Training): The activity of automatically administering online courses, on an individual basis, to users found to be susceptible to this type of attack.
The Simulated Phishing activity consists of:
- Simulated phishing attacks (Phishing Campaigns): An activity conducted periodically to assess, on an individual basis, the susceptibility of the organization’s staff to this type of attack;
- Corrective Training (Remedial Training): The activity of automatically administering online courses, on an individual basis, to users found to be susceptible to this type of attack.
Suggested services
This activity is an automated Ethical Hacking operation that involves monitoring dark web sites to detect possible data exfiltration related to:
- Organizations: monitoring of data exfiltration affecting company personnel caused by cyber supply chain risk, meaning data exfiltration involving one or more individuals or legal entities having relationships with the company;
- Individual information: monitoring aimed at detecting the exfiltration of data (e.g., email addresses) directly connected to the company’s personnel.
The policy management activity will allow the company to simplify the management of compliance requirements by creating an “Audit Trail” of the reading and acceptance of the company’s policies, individually distributing the policies to staff and recording their reading and acceptance, both for existing personnel and integrating it into the onboarding procedure for new personnel. Furthermore, upon the company’s request, it will be possible to develop and later administer comprehension tests on the policies themselves.