PhishMe Inc.’s rapid growth spurs expansion in EMEA

PhishMe, Incorporated, the leading provider of immersive phishing awareness training, has seen rapid growth in the United Kingdom, Europe, and the Middle East in recent months, and is expanding its physical presence in the form of a sales team based in the UK, as well as a future data center to serve the needs of customers in European and Middle Eastern markets.

How PhishMe addresses the top attack method cited in Mandiant’s APT1 report

There’s no shortage of interesting points to take away from the Mandiant® report about the Chinese hacking group APT1 released Tuesday, with many of Mandiant’s findings confirming the threat organized attacker teams pose to enterprises.

First and foremost, the report states, “the most commonly observed method of initial compromise is spear phishing.” This backs up our main message for organizations – to remain focused on the core problem of people being the main vulnerability. Organizations need to proactively address this by developing a user base that is resilient to spear phishing attacks. This doesn’t discount the importance of technology (see our blog post about the NY Times breach), but security behavior management can’t be ignored.

PhishMe Unveils New Features to Address APT at RSA 2013

CHANTILLY, Va., Feb. 21, 2013 — PhishMe Inc., the leading provider of security behavior management services that improve employees’ resilience towards spear phishing, malware, and drive-by attacks, today announced the availability of several new features based on patent pending technologies. These new additions include: PhishMe’s Highly Visible Targets Identifier, Benchmarking, and a new simulation type, the Double Barrel, or the ability to emulate an interactive attacker engaged in conversational phishing using multiple messages.

PhishMe Appoints Nick Lantuh to Board of Directors

CHANTILLY, Va., Feb. 14, 2013 /PRNewswire/ — PhishMe Inc., today announced the appointment of Nick Lantuh to its Board of Directors. PhishMe Inc. offers a turnkey service that helps improve employee behavior in responding to targeted phishing, malware, and drive-by attacks – the most common methods used to compromise corporate and government networks today.

PhishMe’s 2013 RSA Conference Preview

PhishMe (along with our giant bowl of Swedish Fish) will be attending the RSA conference this month for the second time, and we’re pretty excited to be returning to the City by the Bay. We’ve grown a lot since last year’s conference, and this year provides us with a chance to show off how PhishMe has evolved – both as a product and company.

Who better to help us preview our first big event of the year than our founders, CEO Rohyt Belani and CTO Aaron Higbee? I conducted short interviews with each outlining what they are looking forward to, not only about returning to the conference but also about visiting San Fran itself.

The New York Times breached… a PhishMe Sales Pitch?

Most of you are probably aware of the breach that occurred at the New York Times. Employee passwords and sensitive information related to an investigative news story covering the finances of Wen Jiabao, China’s Prime Minister, were compromised. The New York Times’research helps give them a competitive advantage in their industry, it is their proprietary information. It is the equivalent to the theft of financial reports, blueprints and customer data.

The headlines roll in…  The NYTimes breached by spear-phishing! Symantec AV fails to detect attackers! In an official press release, Symantec says, “Anti-virus software alone is not enough.” Later, the CEO of the incident response firm hired to respond to the NYtimes news goes to Bloomberg TV to say that these attacks are rampant and that the group responsible for the breach has been active in nearly 100 other organizations.  In that same interview he says that the attack (spear-phishing) is not unique.

This sounds like the type of story PhishMe would pounce on and twist into an obvious sales pitch right?  Security Technology Fail; Spear Phishing is “rampant” ergo you need the PhishMe training method to change employee behavior regarding email safety.