Whaling Attacks

INKY’s email security solution helps your business stop phishing so you don’t fall victim to costly whaling attacks.

What is a Whaling Attack?

Whaling is a type of attack whereby the criminal impersonates C-level executives and higher-ranking politicians. By assimilating into a believable, trusted figure, the attacker builds rapport, usually using tricks like social engineering to encourage employees to follow directions. After the attacker believes the employees are completely comfortable, the criminal will use email to steal important information, acquire account credentials, or request a financial transfer for their personal gain, at the company’s expense.

You must protect your high-profile executive.

Unlike regular phishing attacks, whaling attacks are decidedly trickier. Attackers rely on the fact employees are too busy to digest each individual element of an email, whether it’s the language, or a fake domain. These rogues get through to busy employees with communications that look real, circumventing any indication of threat.

Why INKY Whaling Protection is the Smartest Choice

State of the Art Executive Protection: INKY sees phishing emails like a human does.

Unlike most anti-phishing software, INKY doesn’t rely on examining URLs and sender addresses to stop phishing emails.  INKY’s brand forgery detection software uses Computer Vision to detect company logos and determine who the email pretends to originate from. 

INKY learns patterns with behavior profiling.

INKY’s true machine learning develops behavior profiles and social graphs that identify suspicious behavior or identities. When INKY sees an email from a sender that doesn’t match a known profile, it sends an impersonation warning.

INKY works with any email client.

No matter whether you’re an Outlook traditionalist, or experimenting with the latest mobile email solutions, Inky integrates into almost any email solution. With just a click, the user can react to the warning banner right in the body of the email. This unique ease of use banner is one of our clients’ favorite features.

Report Phishing Attempts from any device.

A unique feature is the ability to click a “Report this Email” link in every email, which means users can report spam, phish, and other problematic email from any device – web, phone, any email client, with no special software.  Most anti-phishing software only has the capability to work from an installed instance.

Other Threats

INKY’s state of the art machine learning and AI stops these other threats.

Domain Spoofing

INKY uses unique technology to detect  and prevent domain spoofing attacks.

CEO Fraud

INKY blocks CEO fraud attacks known to cause hefty financial losses.

Spear Phishing

INKY take a different approach to spear phishing protection.

Brand Forgery

INKY sees emails like the human does to identify brand forgery attacks

$1.4 billion is lost to email fraud every year.

© 2019 Inky Phish Fence For Office 365. Copyright © 2017 Inky Technology Corporation is the creator of Inky® Secure Email