Automate Your Phishing Defense While Keeping Human Control

When it comes to combatting phishing, “set and forget” is a pipe dream. You can’t, and you shouldn’t, take humans out of the picture. But thanks to CofenseTM automation, you can stop attacks while reducing man hours and saving money.

We’ve added automation across our phishing defense solutions, in ways that keep human control where it’s needed most. Automated tasks that used be manual drudgery are helping to stop phishing attacks quickly and efficiently. You can disrupt attacks as they unfold, while freeing time and resources to deal with the other 99 things on your plate each day.

Playbooks Make Your Anti-Phishing Program More Efficient

Cofense PhishMe™, the solution that invented the phishing simulation industry, now lets you  manage your anti-phishing program with built-in playbooks. Playbooks are a popular way to administer tasks you used to have to grind out by hand.

Our playbooks are built right into the administrator view, making it easy to manage your program. After selecting the criteria, you can automatically create, schedule, and launch phishing simulations to run throughout the year. How long does it take? Fifteen minutes to set up 12 templates. A whole year’s worth of simulations used to take 3 hours—you’re cutting operational time by 91%.

We include out-of-the-box programs to get you up and running fast.  Cofense suggests appropriate scenarios for your playbook program based on your organization’s level of experience with simulated or actual phishing emails. In fact, Cofense PhishMe includes a Starter program if you’re new to anti-phishing, as well as an Intermediate and Experienced program if you want a higher degree of difficulty or have an established program in place.  We also offer a program that delivers timely, real-world threats spotted by the analysts on our Cofense Intelligence™ team.

It’s kind of like being a pilot. By customizing templates and choosing a schedule that works for you, you’re at the controls for take-off. Then you switch over to auto-pilot and let Cofense PhishMe take over. Of course, you can grab the controls any time you like to tweak your simulations or schedule.

Another way our automation isn’t soulless: your phishing simulations reflect the lessons Cofense has learned in helping 40% of the Fortune 1000 strengthen their phishing defenses. Each playbook you create embodies a deep well of knowledge.

Automated Response Gets You to Mitigation Faster

Our incident response solutions use automation too, along with security orchestration to help speed mitigation. Put it all together and you get SOAR, Security Orchestration Automation and Response. In keeping with our theme today, we’ll focus on automation.

After verifying threats, Cofense TriageTM uses playbooks to automate repeatable responses to keep you ahead of trouble. As with Cofense PhishMe, you can easily create a playbook to handle basic tasks. Typically, your playbook would start by creating a help-desk ticket. Next, it automates the analysis of malicious URLs or attachments. Then it determines who else received the phishing email but didn’t report it and instructs the proxy team to block the URL or domain.

Finally, the playbook notifies (and thanks) any user who reported the phony message. Once you create a playbook, you can save and reuse it.

Also like Cofense PhishMe, Cofense Triage recognizes the importance of human control. We leave the critical decision-making to human analysts. They get information on phishing campaigns, including indications of compromise, so those highly trained and expensive experts can use their time efficiently.

Throughout your phishing defense, automation with human control strikes the right balance. You gain efficiency by using playbooks to automate repeatable processes, with human resources stepping in where they can have the most impact.

To learn more about Cofense stops phishing attacks in their tracks, view this short video.

We’re Seeing a Resurgence of the Demonic Astaroth WMIC Trojan
Summer Reruns: Threat Actors Are Sticking with Malware that Works

Leave a Reply