Symbol Security

Human cyber risk reduction platform

Security Awareness Training

Symbol delivers cyber risk reduction training through a multidimensional approach to learning that includes traditional learning and training assets, simulations that involve live action and integration with systems, and a blend of real situations and data to ensure that these lessons and critical thinking can be practiced in the context of everyday activities. The frequency and different styles in which these services engage the users to help ensure that true multi-dimensional learning is occurring and not just single situation retention. If it sounds like a smarter way to learn, it’s because it is!

Compliance

  • Security awareness training may be required to meet certain regulations.

Human Error

  • 90% of cybersecurity breaches are effective due to human error.

Human cyber risk

  • Security awareness training is the single most effective way to reduce human cyber risk.

What topics are covered in the Symbol Security Awareness Training?

  • Review of Your Security Policy (Optional)
  • The Basics of Identifying Phishing Emails
  • Protecting Sensitive Information
  • Insider Threats
  • Password Hygiene and 2FA/MFA
  • Recognizing Phishing and Scams

Phishing Recognition via Simulated Phishing Attacks

Simulations that are targeted and authentic, are exactly how cybercriminals would build them! Employees who identify and diffuse phishing emails can dramatically reduce the number one entry point of cyber criminals. With Symbol’s phishing simulation services, your employees will experience the hands-on practice of phishing identification. Symbol’s Phishing Simulation Service (SPSS) is an automated platform that delivers life-like simulations and includes a robust administrative and reporting toolset, a library of authentic phishing simulation templates, and sophisticated customization capabilities. It has everything you need to ensure measurable improvement in phishing learning and identification.

Customizable Spoofs

  • We help companies launch custom spoofs that are not generic ‘internal IT credential validation’ or ‘big brand password reset’ emails. They look like real emails you receive from your most trusted contacts.

Roster Integration and Maintenance

  • The Symbol Portal allows you to integrate your user roster through O365 integration methods or via .csv uploads. Symbol’s systems are smart enough to ensure that with either method, your user rosters will stay current, and spare you the manual labor of updating your user list.

Phish Alert Button

  • Symbol's Phish Alert Button gives users the ability to report possible or suspicious phishing emails to Symbol with just one click. The symbol also helps you measure the accuracy of phish identification through the use of our Phish Alert Button.

Gamified Learning

  • We know awareness training is critical and it works to reduce cyber risk. However, that doesn’t mean it has to be boring! Symbol’s training and simulations are designed to be lively and fun, challenging users to continue to learn more. Our new gamified experience will put users in competition to strive to reach the top of the leaderboard!

Domain Threat Alerts

Delivered as part of Symbol’s Email and Domain Threat Alerting Service bundle, Symbol’s Domain Threat Alert Service actively monitors your Internet domains for leading indicators of malicious activity. When potential threats are uncovered, Symbol prioritizes them and alerts administrators to take action! Remediation activities are tracked in our dashboards and reports to show progress and highlight open vulnerabilities!

Risk Rating of Your Domain being Attacked

  • Through a partnership with Allure Security (https://www.alluresecurity.com), we deliver a Risk Rating on your domain that gives a good sense of whether the domain is currently Benign or potentially might be at risk of an Account Take Over (ATO) attempt.

Phish Attack Capabilities Assessment of Domains

  • Domain names can be active, dormant, or ‘Parked’ and stored for future use all the time. However, Parked domains can also be hijacked, and weaponized by Cyber Criminals who use them as temporary locations to launch and execute cyber-attacks. Our technology provides a prioritized threat rating that assesses this and other factors while delivering a clear message of threat potential to the Administrator.

Assessment of Potentially Manipulated Domains

  • There are many different ‘variants’ of Domains – some that can fool the naked eye such as transposed letters, different extensions, and replaced letters with numbers or other characters. Other variants are designed more to allude to systems and machines. Symbol assesses all of these potential scenarios and uses proprietary analysis to rate and rank the potential for danger.

Domain Threat Activity Alerting

  • Yes, there are a number of different services that are designed to help you triage a cyber attack after it happens…how about smart analytics to help alert you of the characteristics of a Domain or Cyber attack BEFORE it happens? Symbols AI and Alerting services help distill millions of bits of information down to the events and information that really matter, so your team can prioritize and act more quickly.

Email Threat Alerts

Delivered as part of Symbol’s Email and Domain Threat Alerting Service bundle, Symbol’s Email Threat Alerts Service alerts users and administrators of any instances of stolen or compromised email addresses and related credentials found across thousands of breached data sources that Symbol monitors on a daily basis.

  • The Dark Web is is a highly secure area of the deep web that is intentionally hidden and cannot be accessed using a traditional search engine. Instead, you need a specialized application. Cybercriminals can leverage stolen credentials to compromise corporate systems, commit theft, and implant malicious software and ransomware to networks.
  • Symbol Security alerts users and administrators of any instances of stolen or compromised credentials found on the dark web. The symbol then reports on all user and administrator remediation efforts ensuring that these vulnerabilities are documented and fixed.

Password Hygiene Tools and Alerting Services

Symbol’s security awareness bundles can include optional password management services to give company administrators another tool to help secure their human vulnerabilities and avoid cybercrime. Symbol partners with Keeper Security to deliver these services and will connect to other password management systems to give administrators a set of tools to keep their users safe and maintain a level of visibility into password hygiene and compliance like never before.

Why Invest in Password Management Services?

  • Gain a safe level of auditability across password environments
  • Reduce password-related administrative costs
  • Provide help for “password-fatigued' employees
  • ‘A password policy is not good enough
  • Enforce requirements like minimum password criteria and frequency

Cyber Threat Surveillance

Symbol’s Cyber Threat Surveillance offers clients unmatched visibility into the potential for cybercrime and reputation damage by listening for scenarios associated with your most critical assets, like your company brand, company executives, or product names, on an ongoing basis and over a number of communication channels. Cybercriminals build specific attacks targeted at people or companies, and often there is a build-up to those events. Brands can also be damaged through incorrect or malicious associations on the Deep Web, Dark Web, and Social Networks. Symbol’s Deep Cyber Threat Surveillance helps your organization monitor these activities. When Potential Threats are uncovered, Admins and Users are alerted and remediation can begin.

Symbol’s Cyber Threat Surveillance can help you and your clients defend against:

  • Social Media Profiling Attacks
  • Brand Damage
  • VIP Executive Targeting
  • Post Breach Activities
  • Smearing or Slander Campaigns of any kind
  • Extortion or other misinformation efforts