{"id":2690,"date":"2019-08-08T07:54:10","date_gmt":"2019-08-08T11:54:10","guid":{"rendered":"http:\/\/www.exchangedefender.com\/blog\/?p=2690"},"modified":"2019-08-07T16:55:25","modified_gmt":"2019-08-07T20:55:25","slug":"exchangedefender-phishing-firewall-support-cso","status":"publish","type":"post","link":"https:\/\/www.exchangedefender.com\/blog\/2019\/08\/exchangedefender-phishing-firewall-support-cso\/","title":{"rendered":"ExchangeDefender Phishing Firewall Support (CSO)"},"content":{"rendered":"\n<p style=\"color:#000000\" class=\"has-text-color\">Ever since we committed to <a href=\"https:\/\/exchangedefender.com\/phishing\">ExchangeDefender Phishing Firewall<\/a> as a core feature in ExchangeDefender, we knew that the biggest user benefit will be a trusted cyber-security expert available as a part of the solution. ExchangeDefender redirects all links that pass through ExchangeDefender through our firewall, giving users that click on a suspicious link in their email more information about the suspicious site \u2013 for example, if you clicked on a link in an email from Bank of America and are actually going to a web site in Poland, it might be an issue. But who do you turn to when there is an issue? <\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"554\" src=\"http:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2019\/08\/image-68-1024x554.png\" alt=\"\" class=\"wp-image-2691\" srcset=\"https:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2019\/08\/image-68-1024x554.png 1024w, https:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2019\/08\/image-68-300x162.png 300w, https:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2019\/08\/image-68-768x416.png 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p style=\"color:#000000\" class=\"has-text-color\">ExchangeDefender Chief Security Officer is just a click away and so far we\u2019ve handled over a thousand inquiries from our clients and partners. If you\u2019re looking at a link and you cannot tell why we intercepted and flagged the content, just click on the yellow button and fill out a form.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"872\" src=\"http:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2019\/08\/image-69-1024x872.png\" alt=\"\" class=\"wp-image-2692\" srcset=\"https:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2019\/08\/image-69-1024x872.png 1024w, https:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2019\/08\/image-69-300x255.png 300w, https:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2019\/08\/image-69-768x654.png 768w, https:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2019\/08\/image-69.png 1501w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p style=\"color:#000000\" class=\"has-text-color\"><strong>Within 24 hours you\u2019re guaranteed a response from our team. The turnaround average so far has been just 18 minutes!<br><\/strong>What happens on the back-end is actually quite hands-on: first we investigate the original email and compare the context with the link target, location, etc. We then open the link in a sandbox (safe environment without additional network connectivity and no data) to see what sort of information the web site collects and attempts to send. We then rephrase it in a non-techie user-friendly way and help the client out.<\/p>\n\n\n\n<p style=\"color:#000000\" class=\"has-text-color\">We\u2019ve been overwhelmed with both skepticism and compliments as a result \u2013 turns out most users do not expect a response and are pleasantly surprised when an actual human emails back with useful information. We\u2019ve gotten compliments on our turnaround time, usefulness of information, saving the user from dangerous content, as well as thankful comments about the frustration that phishing in general creates \u2013 as we\u2019ve been fine tuning\u00a0<a rel=\"noreferrer noopener\" target=\"_blank\" href=\"http:\/\/xdref.com\/\">xdref.com<\/a>\u00a0our users are seeing it less and less and when they do see it we are happy to help.<\/p>\n\n\n\n<p style=\"color:#000000\" class=\"has-text-color\">The overall value of the service cannot be overstated \u2013 we\u2019ve saved our CIOs, partners, MSPs, IT guys and gals hundreds of hours in investigative work alone. We got our clients a security audit that allowed them to continue to work quickly. Not to mention about all the bad links that likely would have lead to a breach or security compromise \u2013 that the users and techs never had to deal with.<\/p>\n\n\n\n<p style=\"color:#000000\" class=\"has-text-color\">P.S. Included in <a href=\"https:\/\/exchangedefender.com\/security\">ExchangeDefender Pro<\/a> at no additional cost. If you&#8217;re still frustrating your clients with &#8220;training&#8221; programs\/videos\/whitepapers that SPAM filters catch and junk anyhow &#8211; <em>stop wasting your clients time and money<\/em> &#8211; <a href=\"https:\/\/exchangedefender.com\/phishing\">ExchangeDefender Phishing Firewall<\/a> is a better, more effective, more affordable solution.<\/p>\n","protected":false},"excerpt":{"rendered":"<p> [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,46,48],"tags":[52,153,139,136,152],"class_list":["post-2690","post","type-post","status-publish","format-standard","hentry","category-exchangedefender","category-product-features","category-security","tag-email-security","tag-exchangedefender-phishing-firewall","tag-phishing-firewall","tag-phishing-protection","tag-spear-phishing"],"_links":{"self":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/posts\/2690","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/comments?post=2690"}],"version-history":[{"count":2,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/posts\/2690\/revisions"}],"predecessor-version":[{"id":2694,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/posts\/2690\/revisions\/2694"}],"wp:attachment":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/media?parent=2690"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/categories?post=2690"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/tags?post=2690"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}