SoS Solutions
Explore our solutions designed to exceed your cybersecurity education & awareness requirements.
Stickley on Security was founded in 2007 with a plan to provide organizations with meaningful education and awareness solutions that employees and customers would actually embrace. As our founder Jim Stickley points out, it is simple to offer a training course but far more difficult to actually educate the participants. Our goal is to ensure that your customers and employees not only learn about cybersecurity risks, but that they can apply what they learn into their everyday lives and jobs.
Explore our solutions designed to exceed your cybersecurity education & awareness requirements.
Powered Cybersecurity Training. (PCT) is designed to help solve the challenges small and medium-sized businesses face in attempting to deploy and manage cybersecurity education and phishing simulation.
SoS Advisor was designed to address the customer security education and awareness needs of your organization. We understand that the security threats your customers face change daily. That's why SoS provides new content everyday specifically written for your customers.
Spoofed domains lead to employee and customer compromise. Domain Assure Detect and Domain Assure Prevent are two solutions designed to maintain your organizations online integrity and reduce spear-phishing, typosquatting and other online attacks.
Some of the biggest cyber security breaches in US history have started with a malicious email received by an unsuspecting employee. Using his past 25 years of experience breaking into organizations, Stickley has created BadPhish, the definitive next generation phishing simulator and education solution.
Potential new threats against your organization emerge daily. Employee EDU is designed to ensure your staff is prepared. Through our security education and awareness solutions your staff will not only be trained about important security topics but also be made aware and tested on the latest security threats.
Stickley on Security WorkRemote combines practical education and technology to provide a next-generation remote employee cybersecurity solution. Stickley on Security WorkRemote ensures no corporate data resides at the remote location, no corporate data transported, no individual VPN required, and only encrypted pixels are transmitted.
Jim Stickley speaks at hundreds of board meetings nationwide on cybersecurity related topics and can now speak to your board as well. When Stickley speaks to your board, his goal is to keep them aware of the many cybersecurity threats that your organization faces as well as keep them up to date on the latest cybersecurity regulations. Ultimately Stickley gives your board members the critical information they need to make cybersecurity related decisions.
Business executives and their board members face a never-ending challenge of keeping up with the latest cybersecurity security threats. With all of the audits and reports, security budget requests and regulatory requirements, our cyber security experts can help you make sense of it all.
Once again, hackers have found a sneaky way of hiding malware most of us would never expect. An attacker sending a phishing email with a malicious Zip file attached isn’t unusual. But this newly discovered Zip file hides multiple Zip files like layers of an onion, and one of those files holds malware. This way, the malware bypasses anti-malware detection. Opening the Zip shows a directory of what’s included in the file, but no other directories appear showing the hidden Zip files. As a result, it’s impossible to see or expect there are other Zip files inside.
The name is short for malicious advertising, but malvertising’s long record of infecting devices is growing fast. Last fall, Malwarebytes found month-to-month, a 42% increase in malvertising in the U.S. It’s a strong message that users need to be hyper-aware of these aggressive and hazardous online ads. Cybercriminals use malvertising to download malicious code onto a device. Once a device is infected, any number of cyberattacks can happen.
AI-powered bots are now capable of analyzing vast amounts of data from online profiles. This enables them to craft emails that closely mimic the tone and style of a company or individual. This level of personalization makes the scams more convincing and harder to detect. So, it’s no surprise that there's been a notable surge in highly personalized phishing scams aimed at corporate executives. These scams are becoming increasingly sophisticated and succeeding, largely due to the integration of artificial intelligence (AI) by cybercriminals.