ESET launches phishing derby for channel partners

Held during Cybersecurity Awareness Month ESET has announced an interactive phishing derby for its channel partners.
Held during Cybersecurity Awareness Month ESET has announced an interactive phishing derby for its channel partners.

Today ESET has announced that it is launching an interactive phishing derby for its channel partners. The derby will seek to raise cybersecurity hygiene awareness. An extension of ESET’s Cybersecurity Awareness Training (ECAT), the derby will test the phishing aptitude of partnering workforces. Those partaking will learn how to recognize phishing, avoid scams and understand internet best practices; the perfect event to celebrate Cybersecurity Awareness Month. The event will begin on October 4th and will continue until the end of the year.

“People are the weakest link when it comes to cybersecurity exposure. Offering regular assessment programs for employees, such as the phishing derby, are critical to organizational security,” said Hope McCluskey, director of partner marketing for ESET North America. “We believe collaborating with our channel partners is the best way to educate their customers on basic cyber hygiene practices and enable them to spot suspicious activity and potential threats before an attack occurs.” 

Access to valuable resources 

Partners will be able to customize the game before sending it out to existing and potential customers. The end of the game will also offer customers access to additional cybersecurity resources, trials, demos, and training, positioning it as an ideal tool for both training and relationship management with end-users. In addition, ECAT customers will able be able to conduct unlimited phishing simulations throughout the year to ensure their employees remain vigilant in monitoring attacks. 

The derby allows partners to customize the game before sending it out to existing and potential customers. The end of the game offers customers access to additional cybersecurity resources, trials, demos, and training, making it a great tool for partners to strengthen relationships with end-users. ECAT customers can also conduct unlimited phishing simulations throughout the year to ensure their employees are vigilant in screening for attacks. 

Educating a workforce, not punishing it 

Last month we caught up with Cybersecurity Specialist for ESET, Jake Moore, who emphasizes the need for a cybersecurity culture in the workplace. Moore is fond of fishing simulations, but only when done right. “I think phishing simulations can have a double-edged sword attached to them.” He goes on: “Employees may not know how to report a phishing email when it comes through. However, in the event that they do fall victim to a scam, they should not be chastised over the mistake, as they will likely already feel terrible, and need to be educated instead of punished.” 

Moore emphasizes that deep fakes are “amazing technology,” and have become exceptionally sophisticated, and the rise of ML has enabled attacks to scale drastically. Furthermore, employees may not even know that technology of this kind exists, so organizations cannot punish them for an education that it failed to deliver. 

Users that do not pass the test at the derby (and fall for a phishing scam) will be auto-enrolled into a short course on how to spot phishing scams. The event already expects to sell over 30,000 seats, with most registrants from SMEs and at least 60 ESET partners. The program is also available to ESET’s larger national partner, including CDW, Insight, and Connection.

READ MORE:
About ESET

For more than 30 years, ESET has been developing industry-leading IT security software and services to protect businesses, critical infrastructure and consumers worldwide from increasingly sophisticated digital threats. With solutions ranging from endpoint and mobile security to encryption, multi-factor authentication and endpoint detection and response, ESET’s high-performing, easy-to-use products unobtrusively protect and monitor 24/7, updating defences in real-time to keep users safe and businesses running without interruption. Evolving threats require an intelligent IT security company that enables the safe use of technology. 

For more news from Top Business Tech, don’t forget to subscribe to our daily bulletin!

Follow us on LinkedIn and Twitter

An image of ESET, Security & Data, ESET launches phishing derby for channel partners

Amber Donovan-Stevens

Amber is a Content Editor at Top Business Tech

Addressing Regulatory Compliance in Government-Owned, Single-Use Devices

Nadav Avni • 26th March 2024

Corporate-owned single-use (COSU) devices, also known as dedicated devices, make work easier for businesses and many government agencies. They’re powerful smart devices that fulfil a single purpose. Think smart tablets used for inventory tracking, information kiosks, ATMs, or digital displays. But, in a government setting, these devices fall under strict regulatory compliance standards.

Advantages of Cloud-based CAD Solutions for Modern Designers

Marius Marcus • 22nd March 2024

Say goodbye to the days of clunky desktop software chaining us to specific desks. Instead, we’re stepping into a new era fueled by cloud CAD solutions. These game-changing tools not only offer designers unmatched flexibility but also foster collaboration and efficiency like never before!

What are Multi-core Safety-Critical Avionics?

Wind River • 13th March 2024

A multi-core processor is a type of central processing unit that integrates multiple individual processing units onto a single chip. It supports different cores executing their tasks simultaneously, for quick and enhanced overall performance. Multi-core processors nowadays support safety-critical avionics. Find out more about what multi-core processors are, what multi-core safety-critical avionics are, and how...

Why Transition from 4G to 5G+ vRAN/O-RAN?

Emily Goldshteyn • 13th March 2024

The journey from legacy to 5G doesn’t have to be off-putting. It is a process that, if approached strategically, can make your company a pioneer in the digital age. Virtual and Open RAN, which come with broader choices of technology options and greater flexibility, are giving service providers greater opportunity as they transition their networks....