1. How long does it take to set up?

    The customer can complete setup in about 30 minutes by making changes in DNS and filling out a scoping form.

  2. Which email clients does Phinpoint work with?

    PhinPoint will work with any email system where the customer has access to change the MX record and can provide the IP address of their existing spam filter/entry point for email.

  3. Does PhinPoint work with cloud email clients like Gmail or office 365?

    PhinPoint will work with Gmail or office365 as long as the environment meets the requirements stated in the answer above.

  4. Does PhinPoint work with spam filters?

    Yes, PhinPoint will work with existing spam filters.

  5. I have a spam filter for my email – why do I need PhinPoint?

    While spam filters do a decent job of identifying spam (unsolicited bulk email), bad guys assemble phishing emails with the specific intent of avoiding spam filter detection. PhinPoint is built to recognize phishing indicators in these email that may evade a spam filter.

  6. I outsource my IT, including email, why should I look at getting PhinPoint?

    Email is one of the most common attack vectors for any organization, whether IT is managed internally or by a third-party.

  7. I’m a one-man IT department – how can PhinPoint help me?

    Compromises like wire fraud, malware, and Ransomware all commonly start with a malicious email. These types of events can consume the time of a one-man IT department, not allowing him to work on other important projects or initiatives

  8. What will a ‘tag’ look like when PhinPoint marks an email?

    A tag will be present at the top of the email body. It will identify the component of the email that is potentially harmful, and it will help train the recipient on the concept.

  9. How does PhinPoint determine what to do with emails?

    PhinPoint examines an email and looks for common malicious techniques used to deceive your employees. Based off of that criteria a score is determined, then an email routing action takes place. An email action may include: send the email with no modifications, send the email with a warning tag included, route the email to a quarantine, or drop the email.

  10. Do I have control of where the email goes once PhinPoint decides it may be fraudulent?

    Yes, the customer can choose how to handle a potentially harmful email. TraceSecurity recommends starting with the “tag fraudulent email" action as it provides a passive way to see the filter in action and provide your employees with the most training opportunities.

  11. Does PhinPoint include any ways for an employee to report a malicious email?

    TraceSecurity recommends that your employees report any malicious emails to your IT staff and phinpoint@tracesecurity.com for review.

  12. Can I edit or customize the criteria on what causes an email to be tagged/quarantined?

    Yes, the customer can edit some of the criteria used to classify a potentially harmful email.

  13. Does PhinPoint work with TracePhishing or TraceEDU?

    Yes, PhinPoint helps reinforce the lessons taught during phishing simulations and security awareness training. To effectively combat phishing, TraceSecurity believes that both training and phishing detection is needed.

  14. Are there support tiers or support hours for PhinPoint?

    No, the PhinPoint purchase price includes all support costs.