DetPhish

Defence against phishing.
So that you don't get on the hook.

What Is Phishing?

Phishing is a deceptive online scam where attackers use emails, texts, or fake websites to trick you into revealing sensitive information like passwords, credit card details, or personal data. These scams can lead to financial loss, identity theft, malware infection, and damage to businesses.

Why Is Phishing
So Dangerous?

Phishing is easy to fall for because fake messages often look real and make people react quickly. Scammers copy real company logos and writing styles, use personal details, and create a sense of panic or urgency so you click without thinking. They trick both your eyes and your mind, making it hard to tell what’s real and what’s fake.

DetPhish, The Solution

This video explains you how DetPhish protects you form phishinig

DetPhish Is Easy To Deploy

DetPhish doesn't require:
- subscription
- cloud access
- special apps
- constant monitoring

How Does A Website Know If It's You?

Well, it doesn't.

Conventional security methods are built on the assumption, that the person trying to log in is also authorised to log in. They make only sure, that knowing the a user name and a password is not enough to get access.

But what if it's not you trying to log in? How can a website, e.g. your bank know, if you are trying to log in, or somebody else?

Wouldn't it be useful to make sure, that you are you? Well, we are here to help.

How Does It Work?


Step description

Registration
User registers to Company website, with the company provided "register new account" page. When the new registration is done, the cororate site offers the DetPhish registration module with the DetPhish data elements.


Step description

User Login
Now somebody tries to log in. The usual credentials have to be entered, but now DetPhish is also in play. Every user login triggers the DetPhish counter challenge.


Step description

The Counter Challenge

The user will be sure to access the genuine login page and the company will be sure the user login is valid. Even when user credentials are illegally obtained the credentials would be useless without entering the counter challenge data, making the user's data stays safe.


Step description

Improved Security
No matter if it's a phishing page, or the user's credentials had been obtained illegaly, DetPhish makes sure, that only the legitimate user can log in.