whaling-attack

Whaling Attacks

INKY’s email security solution helps your business stop phishing so you don’t fall victim to costly whaling attacks.

Get INKY Today

What is a Whaling Attack?

Whaling is a type of attack whereby the criminal impersonates C-level executives and higher-ranking politicians. By assimilating into a believable, trusted figure, the attacker builds rapport, usually using tricks like social engineering to encourage employees to follow directions. After the attacker believes the employees are completely comfortable, the criminal will use email to steal important information, acquire account credentials, or request a financial transfer for their personal gain, at the company’s expense.

Dave-Baggett_Spear-Phishing
Whale-1

You must protect your high-profile executive.

Unlike regular phishing attacks, whaling attacks are decidedly trickier. Attackers rely on the fact employees are too busy to digest each individual element of an email, whether it’s the language or a fake domain. These rogues get through to busy employees with communications that look real, circumventing any indication of threat.

Demo INKY Today

Why INKY Whaling Protection is the Smartest Choice.

State of the Art Executive Protection: INKY sees phishing emails like a human does.

Unlike most anti-phishing software, INKY doesn’t rely on examining URLs and sender addresses to stop phishing emails. INKY’s brand forgery detection software uses Computer Vision to detect company logos and determine who the email pretends to originate from.

BrandImpersonation0
BrandImpersonation

INKY learns patterns with behavior profiling.

INKY’s true machine learning develops behavior profiles and social graphs that identify suspicious behavior or identities. When INKY sees an email from a sender that doesn’t match a known profile, it sends an impersonation warning.

INKY works with any email client

Whether you’re an Outlook traditionalist, or experimenting with the latest mobile email solutions, INKY integrates into almost any email solution. With a single click, your users can react to the warning banner right in the body of the email. This unique ease of use banner is one of our clients’ favorite features.

Asset-10-1
Asset-2@4x

Report phishing attempts from any device

A unique feature is the ability to click a “Report this Email” link in every email, which means users can report spam, phish, and other problematic email from any device – web, phone, any email client, with no special software. Most email protection software only has the capability to work from an installed instance.

Executive Report:

Phishing by the Numbers

In this report, we break down some of the critical phishing attack statistics for 2019 by aggregating information from the UK, US, Japanese, and Australian governments, tech publications and Accenture’s 2019 cost of cybercrime report.

Download Report