How our tendering significantly strengthened the employee awareness of a major automotive supplier
Our customer, a German automotive supplier with 10,000+ employees experienced phishing attacks frequently, with very low participation in cybersecurity trainings
We identified the company-specific requirements and supported the selection of th.e most suitable service provider through an anonymous RFQ
Through our in-depth market analysis and the selection of a qualified provider, the click rate of a potentially dangerous mail could be reduced by a factor of 5 after a short time period
Perspective from one of our experts:
Regular phishing attacks
Find out how you can increase your security through awareness trainings
Key requirements and anonymous RFQ
Our customer asked us to increase the participation rate in awareness trainings in order to reduce the click rate of phishing emails as quickly as possible. We first began with the identification of the company-specific requirements. On this basis, we selected three suitable providers based on seven criteria through a detailed market research. We especially focused on the simplicity of integration into existing systems and applications. We then created an anonymous RFQ among potentially suitable service providers and supported our customer in selecting the most adequate tender.
The CyberCompare method:
Reduced click rate due to increased awareness
Based on our customer’s requirements, we contacted three qualified and suitable providers for awareness trainings. We organized a supplier presentation, transparently discussed all details with our customer and made a recommendation. Thanks to our expertise and our verified provider network, our customer was able to select the most suitable provider. The implementation of different awareness trainings increased the acceptance of the measures and encouraged the sensitization in the company. After only a short time, the click rate of phishing mails was reduced from 50 % to 10 %.
Benchmark Report 2022 – the most frequent needs for action – the topics with the highest maturity level
How “Breach and Attack Simulation Tools” can improve your vulnerability management
How you can build your incident response management in three steps
In practice, it is often difficult getting started and prioritizing which actions to take.
A three-step approach can help you to establish solid incident response management. Learn how you can benefit from such a tool in our whitepaper.