You care about your organization’s data security — but all the passwords in the world are no match for users who don’t know how to defend themselves against phishing schemes and cyberattacks. BrainStorm Threat Defense helps you empower users to work more securely and avoid phishing and other cyberattacks in an effective and engaging way.
These four steps are required to get your organization ready to participate in your first Threat Defense Campaign.
- Whitelist BrainStorm Threat Defense
Threat Defense phishing templates simulate real-life phishing attacks, and to accurately gauge how your organization handles phishing attacks the emails must reach your end users. Follow the steps in these articles to whitelist Threat Defense campaigns in your environment:
- Create a Sending Profile
Sending Profiles contain the credentials used to send Threat Defense campaigns. You must have at least one Sending Profile before you can send any Threat Defense campaign.
- Modify a Threat Defense Campaign
QuickHelp's best practice is to duplicate and modify the QuickHelp-provided Campaigns. They are all configured and ready to go - they only need a Sending Profile and some minor configuration changes (e.g. Target Audience, Start Date).
- Track Reported Emails
When dealing with a phishing attack, your end users may report said email via the Report Message add-in for Outlook, and QuickHelp's best practice is to track these reported emails as part of Threat Defense.
While it is QuickHelp's best practice to use the pre-configured campaigns, you can create your own to match any custom campaign you may wish to send.* Steps 1 and 2 above are still required (and step 3 is recommended) for your own custom campaigns, but you can find additional documentation on creating your own campaign elements here.
After running your campaign, review your campaign results. The Understanding Your Threat Defense Campaign Results article breaks down how to navigate the Threat Defense campaign dashboard.
*Technical Support is included in your BrainStorm Threat Defense purchase. Exclusions to this Technical Support are custom email templates, landing pages, feedback pages, or remedial content creation as well as support arising from any customer-created content. These are paid implementation services that require additional fees.