Most effective form of security awareness training.
Unlike traditional training programs, users learn in real-time, all the time.
Business Email Compromise (Whaling)
Impersonation of a CEO, CFO, or trusted individual.
Targeted attacks with no malicious payload and URLs that aren't on any blacklists.
Macros within Office documents can be obfuscated and easily let through.
Domain Similarity Attacks
Domain name misspellings and homoglyphs.
Impersonating well-known brands with like-kind domain names, content, and brand logos.
Zero Day Phishing Attacks
New attack vectors that exploit email clients, file types, or human trust.
This email is dangerous.
Contains a suspicious subject.
Contains suspicious phrasing.
Sender's domain was registered very recently.
A link was registered very recently.
Link with low reputation.
Your contact with this person is limited.
You've never sent this person an email before.
Seamless Deployment in 5 Minutes. No mail routing changes.
Sublime aligned with my goal of arming the sheep instead of fighting the wolves, teaching employees to protect themselves rather than extending the email gateway security Maginot Line.