How PhishMe addresses the top attack method cited in Mandiant’s APT1 report

There’s no shortage of interesting points to take away from the Mandiant® report about the Chinese hacking group APT1 released Tuesday, with many of Mandiant’s findings confirming the threat organized attacker teams pose to enterprises.

First and foremost, the report states, “the most commonly observed method of initial compromise is spear phishing.” This backs up our main message for organizations – to remain focused on the core problem of people being the main vulnerability. Organizations need to proactively address this by developing a user base that is resilient to spear phishing attacks. This doesn’t discount the importance of technology (see our blog post about the NY Times breach), but security behavior management can’t be ignored.

PhishMe Unveils New Features to Address APT at RSA 2013

CHANTILLY, Va., Feb. 21, 2013 — PhishMe Inc., the leading provider of security behavior management services that improve employees’ resilience towards spear phishing, malware, and drive-by attacks, today announced the availability of several new features based on patent pending technologies. These new additions include: PhishMe’s Highly Visible Targets Identifier, Benchmarking, and a new simulation type, the Double Barrel, or the ability to emulate an interactive attacker engaged in conversational phishing using multiple messages.