Do you know who really sent that email?
A key element of a successful phishing attack is pretending to be someone else. No one is going to click on a link or open an attachment that is obviously from a spammer. Attackers pretend to be someone that you know and trust in order to trick you into doing what the attacker wants. Phishers commonly impersonate suppliers requesting payment of an outstanding invoice. Pretending to be an airline confirming an airline reservation has a 90% success rate for attackers. All phishing emails involve email impersonation, and Inky has developed state-of-the-art defenses to protect against even the most advanced phishing attacks.
Inky builds a profile for each member of your organization capturing behavior elements such as frequency, writing style, common expressions, and general email habits (like using Gmail as your mail client). When a new email comes in, Inky compares it against the sender’s profile and warns you if it looks suspicious. In most organizations, there are people that regularly talk to each other and ones that don’t. For example, you probably talk to your boss more often than the department intern emails the CEO. Inky utilizes machine learning to track
Instead of solely relying on known malicious attackers, Inky catches never before seen scams. It scans every facet of the email instantly against dozens of algorithms. Computer Vision “sees” the email like a human would, identifying the brand, recognizing brand-indicative imagery, HTML, colors, etc. Inky can even spot logo-like text (logo types) where there
Emails contain much more than the addressing information and content visible to the recipient. These email headers provide information like the mail client that the sender uses and the sender’s location. Since these rarely change, they can be used as a fingerprint for a given sender. If an email from that sender doesn’t match the fingerprint, Inky will mark it as potentially suspicious.