USBGuru simulated attack service
Posted on 08 October 2012.
Bookmark and Share
Wombat launched USBGuru, a simulated USB attack service to address the growing threat of fraud due to rogue memory devices loaded with malware.

USBGuru is a software-as-a-service product that enables security officers to assess and train employees not to use removable memory devices of unknown origin. An expansion of Wombat’s family of Social Engineering Assessment products, USBGuru improves upon traditional penetration testing, allowing organizations to assess and mitigate risk at the same time by teaching employees to defend against attack.

Security officers use Wombat’s cloud-based interface to easily create a custom executable file with brief training embedded in the file. The executable file is saved onto removable memory devices which can be distributed to any location in and around their organization. When an employee plugs the rogue USB drive into their computer they will be presented with just-in-time training.

The training message will explain the risks associated with removable memory devices and provide practical advice to the employee. The USBGuru administrator interface provides detailed reports for security officers to know who is most susceptible to memory device attack, track training completion, and group susceptible individuals together for targeted follow up.

By assessing and training employees throughout the year, Wombat’s new USBGuru attack simulation service enables security officers to:
  • Determine the risk their organization faces due to the use of rogue memory devices by employees
  • Understand which employees are most susceptible to these attacks and who should receive additional training
  • Provide a teachable moment that ensures employees will follow company policy and only use USB drives they acquired personally, or through their IT department
  • Increase acceptance of security awareness training
  • Protect corporate networks from Malware, Spyware and other malicious software.
Wombat also provides complementary software training modules that can be used in conjunction with mock or simulated attacks to reinforce learned concepts. The combination of simulated attacks and interactive training modules provides the capacity for continuous improvement so security officers can improve their company’s security posture by changing employee behavior.





Spotlight

Security pros and government failing to collaborate

Posted on 17 April 2014.  |  More effective collaboration between government and the information security industry is crucial to protecting organizations from future cyber threats. More work needs to be done to strengthen government’s position as a source of information on potential threats.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Apr 17th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //