Simple, almost free, and highly effective. We'll help you.
For instance, Nerium places a text file named Password.txt with fake login credentials on an open SharePoint page that is accessible to everyone in the organization.
Then, a specific detection rule is written and implemented for this honeytoken or canarytoken. With this detection, Nerium is alerted if, for example, in this case, the fake login credentials are used anywhere in the network.
When a notification occurs, an investigation is conducted to determine exactly what happened. If it's a real attacker, we know they're already in the network, and we initiate our incident response process.
If it's an attack, we can intervene immediately and stop the attack before files are stolen or systems are encrypted.
This can be implemented on every digital layer of an organization, for example, on the cloud layer, the network, or the workstations. Nerium will work with the client to determine the most logical and effective placement for such tokens.
Nerium ensures that the necessary logging is available to assess whether an attacker is attempting to access a honeytoken. Using these log sources, an alert can be generated. By sending these alerts to the Security Information and Event Management (SIEM), Nerium can then continuously respond to the alerts, 24 hours a day, 7 days a week.