‒ The shared value is important to us

Chief information security officer (CISO) Vigleik Hustadnes at Tussa states that awareness among employees is an important focus area for their security work, and how MailRisk is a good fit here.

 ‒ We implement a lot of technical security measures, but you cannot ignore the human factors. MailRisk helps us with increased awareness of email related risk, says Hustadnes.


Vigleik Hustadnes (from the left) and Ivar Driveklepp tell that MailRisk contributes to security awareness at Tussa. (Photo: Erlend Andreas Gjære)

Tussa is a leading energy and communications enterprise, headquartered in Ørsta on the beautiful west coast of Norway. They started using MailRisk during fall 2018, and launched the button internally through a collaboration between their ICT and communication departments.

In addition, they performed a simulated phishing rehearsal. This resulted in more than half of their employees taking the button into use already on the first day, and the response from people is positive.

‒ We receive regular reports of suspicious emails from employees, explains the chief information security officer.

Time saving security help

At the same time, he experiences that MailRisk saves him time for following up on suspicious emails in their company.

‒ There are always someone who are uncertain whether an email is safe or not. When emails like these have previously been forwarded to our IT staff, it usually takes several messages back and forth before we receive the information we need. All of this goes by itself when people use MailRisk.

Moreover, it is not only the individual user who can get help. MailRisk efficiently makes visible emails which several colleagues have been suspicious about.

‒ The shared value is important to us, confirms Elling Dybdal, who is the CEO of Tussa.

He explains that he regularly receives attempts of fraud in his inbox, which he find pretty simple to detect himself. Nevertheless, he appreciates that his colleagues can help each other with computer security. The culture for security is also emphasised by Hustadnes, who adds that efficient notifications makes it possible to detect and stop potentially dangerous emails more efficiently.

Environment and security

In addition to sustainable energy production, Tussa can be proud of running the greenest data center in Norway. Ivar Driveklepp, who is managing director in the subsidiary Tussa ICT, describes how energy from computing equipment is recycled in their facilities. Heating for the company's entire headquarteres is covered by surplus heat from the data center. Moreover, this energy can be stored in the mountain below, and be delivered as remote heating to others.

But the environment is not the only important topic for Tussa ICT. The company also works systematically to become certified according to the ISO 27001 standard for information security. This requires both technical and organizational controls, awareness, and also a system to monitor security performance.

Along with statistics for reported emails on a daily basis, results from simulated phishing exercises can be used as measuring tools in the certification process.

‒ We see that MailRisk fits well along with other security controls we have implemented, Hustadnes finishes.

Want to try MailRisk in your company?

We are happy to offer you a trial!

Continue reading

Simulated phishing: How to design a suitable scam

How do you prepare the most effective phishing email to serve the goal of your exercise? In the third part of this series on simulated phishing, we describe various approaches to designing phishing content.

How to succeed with security behavior change

To stay safe online, people need to care more about the security decisions they face every day. But unless the obvious gains obviously exceed the required effort, change is often avoided. Luckily, behavior change in general has been subject to a lot of research, and here are some takeaways for information security professionals.

Simulated phishing: Communications strategy

How do you prepare an organization for you to try and trick them? In the second part of this series on simulated phishing, we provide the outline for a communications plan.

See all posts →

Human security sensors ebook cover

Ready to get started?

We have written a guide for you to get started with human-centered security. Access our free resource now, and learn:

  • How to nurture drivers for employee engagement
  • How to avoid common obstacles for reporting
  • Practical examples and steps to get started

Download free PDF →