find-the-phish-oninbox-red-sift

Can you outsmart the hackers? Try Find the Phish!

With the upcoming release of our advanced threat protection software OnINBOX, we’ve put together a fun game for you to play at home called Find the Phish.

Find the Phish is our phishing simulation game where you have to spot which email is the phishing email. But be warned – it’s not as easy as you might think!

How to play Find the Phish

We give you a choice of 2 emails and you have 30 seconds to decide which one is the phish. Giving you no help would be pretty horrible of us, we get that, so we’ve included a handy feature to toggle OnINBOX on or off as you need.

Our advanced threat protection software OnINBOX makes it easy to spot a phish because it tells users how to ACT.

What is ACT?

A = authenticate
We authenticate the email by evaluating the security protocols the sender has in place. The stronger their security, the lower the risk of you being spoofed by a familiar partner, supplier or other contact in your supply chain.

C = content
We scan the content of your emails to highlight hidden signals that might cause you harm, like malicious URLs or a hijacked domain. This is combined with advanced machine learning models that empower OnINBOX to spot non-technical threats with social-intelligence by analyzing human language and behaviour. This means your employees don’t have to!

T = trust
OnINBOX learns about the way you interact with people to identify threats and build up your very own trust network. It takes one click to classify a contact with confidence based on the results OnINBOX gives you.

If any one of A, C or T fails, the letter turns red and you know not to trust anything inside the email you’ve received – it could be a phish!

We hope you enjoy the game and be sure to share it with your friends and work colleagues! You can find out more about OnINBOX below.

Find out more

PUBLISHED BY

Alex Gimson

25 Jun. 2021

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
Certificates

Preventing certificate related violations in cybersecurity frameworks:  A guide to certificate monitoring…

Rebecca Warren

TLS is one of the most widely adopted security protocols in the world allowing for unprecedented levels of commerce across the internet.  At the core of the TLS protocol is TLS certificates. Organizations must deploy TLS certificates and corresponding private keys to their systems to provide them with unique identities that can be reliably…

Read more
ASM

Red Sift ASM & Red Sift Certificates: the missing link in your…

Billy McDiarmid

According to Gartner, Attack Surface Management (ASM) refers to the “processes, technology and managed services deployed to discover internet-facing enterprise assets and systems and associated exposures which include misconfigured public cloud services and servers.” This broad category of tooling is used within Continuous Threat Exposure Management (CTEM) programs, with many vendors within it having…

Read more
Email

The best tools to protect yourself from SubdoMailing

Francesca Rünger-Field

In late February 2024, ‘SubdoMailing’ became a trending search term overnight. Research by Guardio Labs uncovered a massive-scale phishing campaign that had been going on since at least 2022. At the time of reporting, the campaign had sent 5 million emails a day from more than 8,000 compromised domains and 13,000 subdomains with several…

Read more
Product Release

Red Sift’s Spring 2024 Quarterly Product Release

Francesca Rünger-Field

This early into 2024, the cybersecurity space is already buzzing with activity. Emerging standards, such as Google and Yahoo’s bulk sender requirements, mark a new era of compliance for businesses reliant on email communication. At the same time, the prevalence of sophisticated cyber threats, such as the SubdoMailing campaign, emphasizes the continual hurdles posed…

Read more