User Behavior
Security Ratings
BEC and Phishing Susceptibility Score
Dark Web Presence Investigation Module
Domain Intelligence Investigation Module
Sentiment and Financials Investigation Module
The "User Behavior" measure in security ratings refers to the assessment or evaluation of the actions, patterns, and activities exhibited by users within an organization concerning security practices and protocols. It analyzes how users interact with systems, applications, data, and sensitive information and their adherence to security policies and best practices.
User behavior encompasses various aspects, including authentication and access, data handling, phishing awareness, software updates and patching, and safe internet usage.
By analyzing user behavior, organizations can identify potential risks, vulnerabilities, and areas for improvement in their security practices. It helps in understanding the effectiveness of security awareness training programs, identifying areas where additional training or reinforcement may be required, and assessing the overall security culture within the organization.
ThreatNG Security Ratings incorporate intelligence substantiated with external attack surface management and digital risk protection capabilities, which can enhance the fidelity and validity of a User Behavior rating. By leveraging various components such as Domain Intelligence, Dark Web Presence, Sentiment and Financials, and deeper inspection for susceptibility to Business Email Compromise (BEC) and phishing attacks, ThreatNG comprehensively assesses an organization's user behavior.
Each of the following components contributes to the fidelity and validity of the User Behavior rating:
External Attack Surface Management: ThreatNG monitors an organization's external attack surface, which includes domains, IP addresses, and network infrastructure. The solution identifies potential vulnerabilities and entry points that attackers may exploit by continuously scanning and analyzing these assets. This information helps assess the overall security posture, including any potential risks associated with user behavior.
Digital Risk Protection: Through digital risk protection capabilities, ThreatNG gathers information from various sources, including the Dark Web. Monitoring the Dark Web presence identifies potential indicators of compromised user credentials, leaked data, or other user-related risks. This component enhances the validity of the User Behavior rating by uncovering any potential risks associated with user behavior on external platforms.
Domain Intelligence: ThreatNG domain intelligence offers valuable insights into an organization's domain-related data and information, enabling a more accurate assessment of user behavior. It proactively identifies phishing and spoofing possibilities, identifies brand misuse, and detects domain-based threats, contributing to a comprehensive evaluation of user awareness, safe internet usage, and phishing response. By integrating Domain Intelligence, ThreatNG strengthens the User Behavior security rating by considering crucial domain-related risks and behaviors.
Sentiment and Financials: ThreatNG analyzes sentiment data and financial information related to the organization. It considers negative news, lawsuits, layoff chatter, ESG violations, SEC filings, and financial indicators. This information helps evaluate potential risks associated with user behavior, such as insider threats or compromised user accounts. Including sentiment and financial analysis contributes to the validity of the User Behavior rating by considering external indicators of potential risk.
Deeper Inspection for BEC and Phishing Susceptibility: The ThreatNG BEC and Phishing Susceptibility Security Rating enhances the fidelity and validity of the User Behavior measure by using intelligence gathered from the Sentiment and Financials and Domain Intelligence investigation modules. These modules provide valuable insights into an organization's online sentiment, financial data, and domain-related information. By incorporating this intelligence, ThreatNG can assess user behavior more accurately, considering factors such as the organization's susceptibility to BEC and phishing attacks, users' awareness and response to social engineering techniques, and their adherence to secure practices while handling sensitive data. This integration enables a comprehensive evaluation of user behavior and enhances the overall validity and accuracy of the User Behavior security rating.
By integrating these various capabilities, ThreatNG provides a holistic assessment of an organization's user behavior. Incorporating intelligence from external sources, attack surface management, digital risk protection, and deeper inspections adds fidelity and validity to the User Behavior rating. This enables organizations to comprehensively understand potential risks associated with user behavior and take appropriate measures to mitigate those risks.