Skip to main content

Help us improve the Digital Marketplace - send your feedback

Grant Thornton UK LLP

Grant Thornton - Phishing Simulator

An online tool for performing social engineering testing. With our tool we can conduct simulated phishing attacks (fake emails designed to entice users to click on fake links or enter security credentials) to test and train your employee’s security awareness.

Features

  • Tailored and targeted phishing simulation campaigns
  • Builds into a phishing awareness program
  • Over 1000 pre-configured or fully customisable phishing email templates
  • Progressive testing and online courses
  • Management reports

Benefits

  • Employees are aware of email threats and risks
  • Training and awareness reduces employee errors
  • Promotion of consistent phishing education to become more cyber resilient
  • Bolster your current cyber security training and development
  • Help to protect your company’s reputation and brand

Pricing

£2,500 a unit

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at publicsector.bids@uk.gt.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

4 6 2 9 9 0 1 8 6 7 2 2 8 3 6

Contact

Grant Thornton UK LLP Public sector bids team
Telephone: 0207 728 3311
Email: publicsector.bids@uk.gt.com

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
None
System requirements
None

User support

Email or online ticketing support
Email or online ticketing
Support response times
Best endeavours
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
The phishing simulation campaign is conducted remotely by Grant Thornton's team, our team are available to provide email support 9-5 UK business hours
Support available to third parties
No

Onboarding and offboarding

Getting started
No customer training is required. The Grant Thornton team will work with the client to understand the context of their business and the full scope of the phishing simulation exercise, and will work with the client to create bespoke phishing email campaigns.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
User provided data is returned using a CSV and is deleted from our servers.
End-of-contract process
The service is switched off and users can no longer access it. There are no additional costs.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
The phishing simulator can be used on any device, providing the ability to perform administrative tasks in the office or on the go. Our custom landing pages are also device-friendly to make the user feel safe and create the most convincing phishing lure
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
The service interface allows you to control every aspect of your phishing awareness program, with pre-configured an customizable phishing tests and online courses.

When you first log into the platform, you will be presented with your Dashboard. This central location gives you an overview of your account, let you view current and scheduled tests, and perform basic activities. All functions and features can be reached from the Dashboard
Accessibility standards
None or don’t know
Description of accessibility
The phishing simulator is a web-based system. Users access the system via a standard web browser.
Accessibility testing
Not known
API
Yes
What users can and can't do using the API
Many of the features available within the Phishing Simulation tool are available through the PhishingBox API
API documentation
Yes
API documentation formats
PDF
API sandbox or test environment
No
Customisation available
Yes
Description of customisation
All phishing templates and courses can be customized as necessary or created from scratch. This includes a website cloning feature for quick template creation

Scaling

Independence of resources
Through proactive capacity management, reserving 80% capacity for peak loads

Analytics

Service usage metrics
Yes
Metrics types
We provide a range of service usage metrics around testing activity broken down into categories Delivered, Opens, Clicks, Data Extended (e.g., opened attachment, entered data, etc.), and Training Action. We also list the targets who clicked and failed the most.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
PhishingBox

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
All scan data is provided at the end of the scanning exercise in the form of a detailed Vulnerability Assessment Report.
Data export formats
CSV
Data import formats
  • CSV
  • Other
Other data import formats
LDAP

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Our phishing simulations are conducted at a time that is agreed in advance with the client.
Approach to resilience
Available on request
Outage reporting
In the unlikely event we are unable to conduct the phishing simulations at the agreed time, we will notify the client via email or telephone to arrange an alternative time.

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
Only authorised GT personnel will have access to our vulnerability scanning solution
Access restriction testing frequency
At least every 6 months
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Lloyds Risk Quality Assurance
ISO/IEC 27001 accreditation date
28/06/2015
What the ISO/IEC 27001 doesn’t cover
Audit and Tax services
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
  • ISO/IEC 27001
  • Other
Other security governance standards
We have been certified under the Cyber Essentials Plus scheme by a CREST (Council of Registered Ethical Security Testers) approved organisation
Information security policies and processes
Grant Thornton operate a framework of Information Systems (IS) Security policies. These policies include a risk assessment for threats to Information Security. The policies are published internally for the guidance of all employees and reviewed on a quarterly basis.

We employ a full-time IS Security Manager, who is responsible for the co-ordination of our IS Security policies, network, data security and incident management. Any updates are processed through out Change and Release Management (CARM) process. They are also reviewed and proved by the National Director of Information Systems

We have been certified under the Cyber Essentials Plus scheme by a CREST (Council of Registered Ethical Security Testers) approved organisation.

Grant Thornton maintains ongoing compliance with the ISO27001:2013 certification for Information Security Management Systems

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Grant Thornton have implemented a Change and Release Management (CARM) process, based on the ITIL Service standard that complies with best practice.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
The external network is subject to monthly vulnerability testing, or in response to specific threats, using a CREST accredited third party. Where a high-level vulnerability is identified, the Incident Management process is utilized to quickly resolve the issue and identify any security breaches. The results of each scan are recorded within the IS Service desk system and reviewed by the senior IS Managers to organise the resolution of any identified issues. All remediation is conducted through the Change And Release Management (CARM) process.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
All network events are recorded for use as part of an investigation in the event of an incident. Systems administrators monitor firewall and security software for alerts and respond accordingly. Network logs are maintained as part of the IS Security controls and the Document Management System logs all account activity within an audit log that is inviolate which can only be accessed by the systems administrator.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Incident Management procedures have been implemented as part of both the ISO 20000 and 27001 certifications. All people can report Information Security incidents through the IS Service desk or Grant Thornton House main reception which is supported by the Grant Thornton facilities provider on a 24-hour basis.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Fighting climate change

Fighting climate change

Our environmental actions will focus on our three major carbon sources:

1) Business travel

2) Waste generation and disposal of non-recyclable waste; and

3) Gas usage for heating offices, electricity use, air-conditioning and IT.

METHOD

For each call off from the framework we will propose, as a minimum, to:

- identify specific targets an individual client (or collaboration of AOs) has and how they can be integrated into our work

- agree our approach collaboratively: does the project require significant co-location and/or travel, or can the project be completed via remote or hybrid working? Our default is to reduce unnecessary travel and emissions to the minimum feasible and we will suggest ways for doing so that will not reduce quality or delivery

- use local capability to reduce travel and commute time: we have 27 offices across the UK and will use suitably qualified local teams wherever practical

Pricing

Price
£2,500 a unit
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
Upon request we can provide a free trial of the phishing simulation tool.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at publicsector.bids@uk.gt.com. Tell them what format you need. It will help if you say what assistive technology you use.