Grant Thornton - Phishing Simulator
An online tool for performing social engineering testing. With our tool we can conduct simulated phishing attacks (fake emails designed to entice users to click on fake links or enter security credentials) to test and train your employee’s security awareness.
Features
- Tailored and targeted phishing simulation campaigns
- Builds into a phishing awareness program
- Over 1000 pre-configured or fully customisable phishing email templates
- Progressive testing and online courses
- Management reports
Benefits
- Employees are aware of email threats and risks
- Training and awareness reduces employee errors
- Promotion of consistent phishing education to become more cyber resilient
- Bolster your current cyber security training and development
- Help to protect your company’s reputation and brand
Pricing
£2,500 a unit
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 6 2 9 9 0 1 8 6 7 2 2 8 3 6
Contact
Grant Thornton UK LLP
Public sector bids team
Telephone: 0207 728 3311
Email: publicsector.bids@uk.gt.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- None
- System requirements
- None
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Best endeavours
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- The phishing simulation campaign is conducted remotely by Grant Thornton's team, our team are available to provide email support 9-5 UK business hours
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
- No customer training is required. The Grant Thornton team will work with the client to understand the context of their business and the full scope of the phishing simulation exercise, and will work with the client to create bespoke phishing email campaigns.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- User provided data is returned using a CSV and is deleted from our servers.
- End-of-contract process
- The service is switched off and users can no longer access it. There are no additional costs.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The phishing simulator can be used on any device, providing the ability to perform administrative tasks in the office or on the go. Our custom landing pages are also device-friendly to make the user feel safe and create the most convincing phishing lure
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
-
The service interface allows you to control every aspect of your phishing awareness program, with pre-configured an customizable phishing tests and online courses.
When you first log into the platform, you will be presented with your Dashboard. This central location gives you an overview of your account, let you view current and scheduled tests, and perform basic activities. All functions and features can be reached from the Dashboard - Accessibility standards
- None or don’t know
- Description of accessibility
- The phishing simulator is a web-based system. Users access the system via a standard web browser.
- Accessibility testing
- Not known
- API
- Yes
- What users can and can't do using the API
- Many of the features available within the Phishing Simulation tool are available through the PhishingBox API
- API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- All phishing templates and courses can be customized as necessary or created from scratch. This includes a website cloning feature for quick template creation
Scaling
- Independence of resources
- Through proactive capacity management, reserving 80% capacity for peak loads
Analytics
- Service usage metrics
- Yes
- Metrics types
- We provide a range of service usage metrics around testing activity broken down into categories Delivered, Opens, Clicks, Data Extended (e.g., opened attachment, entered data, etc.), and Training Action. We also list the targets who clicked and failed the most.
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- PhishingBox
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- All scan data is provided at the end of the scanning exercise in the form of a detailed Vulnerability Assessment Report.
- Data export formats
- CSV
- Data import formats
-
- CSV
- Other
- Other data import formats
- LDAP
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Our phishing simulations are conducted at a time that is agreed in advance with the client.
- Approach to resilience
- Available on request
- Outage reporting
- In the unlikely event we are unable to conduct the phishing simulations at the agreed time, we will notify the client via email or telephone to arrange an alternative time.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Only authorised GT personnel will have access to our vulnerability scanning solution
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- No audit information available
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Lloyds Risk Quality Assurance
- ISO/IEC 27001 accreditation date
- 28/06/2015
- What the ISO/IEC 27001 doesn’t cover
- Audit and Tax services
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
- We have been certified under the Cyber Essentials Plus scheme by a CREST (Council of Registered Ethical Security Testers) approved organisation
- Information security policies and processes
-
Grant Thornton operate a framework of Information Systems (IS) Security policies. These policies include a risk assessment for threats to Information Security. The policies are published internally for the guidance of all employees and reviewed on a quarterly basis.
We employ a full-time IS Security Manager, who is responsible for the co-ordination of our IS Security policies, network, data security and incident management. Any updates are processed through out Change and Release Management (CARM) process. They are also reviewed and proved by the National Director of Information Systems
We have been certified under the Cyber Essentials Plus scheme by a CREST (Council of Registered Ethical Security Testers) approved organisation.
Grant Thornton maintains ongoing compliance with the ISO27001:2013 certification for Information Security Management Systems
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Grant Thornton have implemented a Change and Release Management (CARM) process, based on the ITIL Service standard that complies with best practice.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- The external network is subject to monthly vulnerability testing, or in response to specific threats, using a CREST accredited third party. Where a high-level vulnerability is identified, the Incident Management process is utilized to quickly resolve the issue and identify any security breaches. The results of each scan are recorded within the IS Service desk system and reviewed by the senior IS Managers to organise the resolution of any identified issues. All remediation is conducted through the Change And Release Management (CARM) process.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- All network events are recorded for use as part of an investigation in the event of an incident. Systems administrators monitor firewall and security software for alerts and respond accordingly. Network logs are maintained as part of the IS Security controls and the Document Management System logs all account activity within an audit log that is inviolate which can only be accessed by the systems administrator.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Incident Management procedures have been implemented as part of both the ISO 20000 and 27001 certifications. All people can report Information Security incidents through the IS Service desk or Grant Thornton House main reception which is supported by the Grant Thornton facilities provider on a 24-hour basis.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
Our environmental actions will focus on our three major carbon sources:
1) Business travel
2) Waste generation and disposal of non-recyclable waste; and
3) Gas usage for heating offices, electricity use, air-conditioning and IT.
METHOD
For each call off from the framework we will propose, as a minimum, to:
- identify specific targets an individual client (or collaboration of AOs) has and how they can be integrated into our work
- agree our approach collaboratively: does the project require significant co-location and/or travel, or can the project be completed via remote or hybrid working? Our default is to reduce unnecessary travel and emissions to the minimum feasible and we will suggest ways for doing so that will not reduce quality or delivery
- use local capability to reduce travel and commute time: we have 27 offices across the UK and will use suitably qualified local teams wherever practical
Pricing
- Price
- £2,500 a unit
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Upon request we can provide a free trial of the phishing simulation tool.