Business Email Hosting offers you large mailbox sizes & cost savings!

Phishing Email Assessment

Phishing Email Assessment

Find out how prepared are your staff against social engineered email scam.

Protection Against Business Email Compromise (BEC)

Business Email Compromise (BEC) is a social engineered email scam that aims at extracting confidential business information or money through fraudulent requests for payment or wire transfer. Impersonation of a company’s CEO, senior executives, business partners or known contact of the victim, using a spoofed email account to send the request, is the most common method used by BEC attackers.

Email Security Gateways such as SpamZetta can remove unwanted spam emails that exhibit certain patterns or are sent from known blacklist sources. Unfortunately, BEC is social engineered carefully by attackers to slip through such algorithm based email security gateway. BEC related emails are highly targeted and specific to the victim’s day-to-day business dealings and could sometimes be sent from authentic mailboxes that have been used to communicate with the victim on daily basis.

To combat BEC, vigilance among staff is important. This is where SecureAX Phishing Email Assessment helps minimise BEC risk within your organisation! This service covers three broad scopes :- Identifying & Targeting A Scenario, Conducting Phishing Simulation Email, and Providing Awareness Training to improve cybersecurity awareness within your company.

Targeted Scenario

Scenarios for potential phishing email are designed based on customers' operations and business procedures

Phishing Simulation

Simulation is carried out by sending emails that certain staff or department could be vulnerable to, ie banking related email for finance department.

Awareness Training

For any staff that failed in the phishing simulation, awareness training will be given before another round of phishing simulation is carried out

Protection Against Business Email Compromise (BEC)

Phishing Email Assessment

Let us help you find out how susceptible is your staff or department to becoming a victim of Business Email Compromise (BEC) through our systematic approach of Phishing Email Assessment:
1. Understanding & gathering potential phishing email scenarios
2. Planning for a 2-week window period to carry out phishing email simulation
3. Reviewing initial report, find out who viewed, clicked or interacted with the simulated email
4. Conducting awareness training for these email users & testing them with simulated email again
An extract of our report which identifies the email user who interacted with the simulated email

Contact us for a quote.

Our Phishing Email Assessment starts from S$5,000, depending on the number of staff and frequency needed

    Frequently Answered Questions

    What is the deliverable from Phishing Email Assessment?
    The aim of a phishing email assessment is to target staff members by simulating a realistic phishing email attack and analysing the response from staff members. This allows companies to understand how likely they are to be compromised by a phishing attack and identify key departments or people that may require additional security awareness training. Regular phishing email assessment allows you to track the progress your security awareness training over time, and minimise the risk of your staff falling into social engineered email scam, such as Business Email Compromise (BEC)
    What impact can phishing email have on my company?
    Millions of dollars are lost through phishing email in Singapore every year. Having staff who are vigilant will reduce this financial risk significantly. Besides financial loss, confidential and sensitive business information can be protected if your staff are careful in distinguishing genuine and phishing emails.
    Do I need Phishing Email Assessment?
    Companies of all sizes can benefit from a phishing email assessment. A lot of time and money is spent hardening infrastructures and applications used by the company but ‘people’ are often overlooked even though they are typically the easiest way for an attacker to breach an organisation.