quora ThreatCop Cyber Security Case Study: Healthcare Industry

Home / Healthcare Industry


  • Pharmaceutical


  • 6000+ Employees
  • $ 0.24 billion Revenue

Company Overview

The organization is a leading global herbal health and personal care services provider in India that believes in delivering safe, effcacious, and affordable products to its customers. They approached Kratikal for improving their organizational security and reduce the overall risk of their organization. they were conducting regular training sessions to protect their employees from cyberattacks, but the impact was not on the same scale.


The organization approached Kratikal for improving cyber resilience. They were not able to determine if their efforts in educating their employees about cyber awareness were as impactful as they had expected it to be. They did not have a well-defined mechanism for checking the vulnerability level of the employees and to measure the effciency of the training sessions. Kratikal’s niche expertise in combating corporate espionage cases and online crimes made us capable to fulfil their requirements.

Get in!

Here’s an opportunity for you to stand out from the crowd!

Join our weekly newsletter Cyber Times and become a part of our Cyber Resilient Community


Our product was deployed in dierent departments of the organization under the 3-stage risk assessment cycle; the tool signicantly reduced the cyber risk of the organization during the period of 6 months.

    1. Simulation 1.0

    We imported the Active Directory (AD) of the organization into threatCop and sent phishing emails to all the employees. This email offered lucrative deals in the Amazon and Flipkart gift cards to employees.

    Simulation Emails Send Emails Opened Link Clicked Employees Hacked
    Initial Simulation 1366 604 427 287
    Final Simulation 1366 298 107 14

    2. Knowledge Imparting

    Based on the responses of the employees to the phishing emails, we sent customized learning-based modules to all the employees which included details on how to identify phishing emails, appropriate response strategies, and policies on how to report such incidents.

    3. Assessment

    This was a self-assessment of employees based on the learning-based modules shared with them. The assessment included a wide variety of questions ranging from identification to reporting of phishing emails.

Cyber Security Blogs

Cyber Security Blogs

Notorious Ransomware Attacks by REvil in 2021

REvil (Ransomware Evil), also known as Sodinokibi, is an infamous private ransomware-as-a-service (RaaS) group held responsible for...

Cyber Security Blogs

A CISO’s Guide to Security Awareness Training for Employees

Security is everyone’s responsibility and when it comes to an organization’s security, every member is responsible for ensuring good cyber hygiene...

Cyber Security Blogs

How Attackers Hack Mobile Phones to Breach an Organization?

If you think that there is no way cyber criminals can hack your organization through mobile phones, think again. Whether your company has just ten employees...