You may be able to catch a general phishing attack, but what if the phisher targets you personally?
Targeted threat phishing or spear phishing is a big deal for cybersecurity. An estimated 95% of successful cyberattacks begin as a spear phishing email. Targeted spear phishing emails are customized to a specific person, perhaps someone in Accounts convincing them to pay an invoice, or impersonating a CEO requesting an urgent wire transfer or company data. These specially crafted attacks may be in the works for weeks, and often employ multiple strategies including brand forgeries, known staff names and nicknames, and email addresses, client rosters, attorneys, vendors, social media and public information specific to one person.
Inky’s specialized targeted threat protection algorithms catch these email impersonators using advanced overlapping approaches simultaneously in ways not yet seen in our industry. With a three-pronged approach, Computer Vision, Machine Learning, and over 2 dozen algorithms work together to scan every element of the email instantly.
Business Email Compromise (BEC) attacks, a specific type of targeted attack, have been estimated by the FBI to cost businesses over $12 billion USD worldwide between October 2013 and May 2018. Save yourself from financial loss and headaches by setting up our 2-week trial.
Brand Forgeries and Sneaky Text
True Machine Learning
Easy Deployment & Usability
How Does Inky Protect You from Targeted Threats?
Inky analyzes every aspect of a potential phishing email.
Emails contain tracking information in their headers and potentially malicious code in its attachments. Inky’s uniqueness is in its combination of Computer Vision, Machine Learning, and brand forgery detection to look at every part of an email looking for deviations from the expected.
Inky’s warnings educate and protect users.
When marking an email as potentially suspicious, Inky includes information about the specific threat that the email may contain. This trains the users what to look for, and provides real-time education about threats to their organization.
Inky installation is fast and easy.
Inky’s server-focused design means that no software needs to be installed on client machines. With Inky’s two-week free trial, every device in an organization can be protected against phishing threats by Inky within a few hours.
Inky keeps admins informed
Inky’s Admin Dashboard was designed with IT Departments in mind, bringing usability and threat tracking to the next level. Each email also contains a “Report the Email” link, making it easy for users to take action against identified phishing attacks. Reports go to Inky’s Administrative Dashboard, allowing admins to stay up-to-date on threats and take action against attacks on their organization.
Want to See Inky in Action?
See Inky in action with a free scan of your inbox or get in touch to get a demo from one of our experts.