USBGuru simulated attack service
Posted on 08 October 2012.
Wombat launched USBGuru, a simulated USB attack service to address the growing threat of fraud due to rogue memory devices loaded with malware.

USBGuru is a software-as-a-service product that enables security officers to assess and train employees not to use removable memory devices of unknown origin. An expansion of Wombatís family of Social Engineering Assessment products, USBGuru improves upon traditional penetration testing, allowing organizations to assess and mitigate risk at the same time by teaching employees to defend against attack.

Security officers use Wombatís cloud-based interface to easily create a custom executable file with brief training embedded in the file. The executable file is saved onto removable memory devices which can be distributed to any location in and around their organization. When an employee plugs the rogue USB drive into their computer they will be presented with just-in-time training.

The training message will explain the risks associated with removable memory devices and provide practical advice to the employee. The USBGuru administrator interface provides detailed reports for security officers to know who is most susceptible to memory device attack, track training completion, and group susceptible individuals together for targeted follow up.

By assessing and training employees throughout the year, Wombatís new USBGuru attack simulation service enables security officers to:
  • Determine the risk their organization faces due to the use of rogue memory devices by employees
  • Understand which employees are most susceptible to these attacks and who should receive additional training
  • Provide a teachable moment that ensures employees will follow company policy and only use USB drives they acquired personally, or through their IT department
  • Increase acceptance of security awareness training
  • Protect corporate networks from Malware, Spyware and other malicious software.
Wombat also provides complementary software training modules that can be used in conjunction with mock or simulated attacks to reinforce learned concepts. The combination of simulated attacks and interactive training modules provides the capacity for continuous improvement so security officers can improve their companyís security posture by changing employee behavior.


eBook: Cybersecurity for Dummies

Posted on 16 December 2014.  |  APTs have changed the world of enterprise security and how networks and organizations are attacked. These threats, and the cybercriminals behind them, are experts at remaining hidden from traditional security while exhibiting an intelligence, resiliency, and patience that has never been seen before.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Thu, Dec 18th