After you complete this step, Skopos will identify risks for you on your laptops, workplaces and the dark-web. To get started, make sure you are logged on to your Skopos dashboard at https://portal.skoposlab.eu. After login you can start to tell Skopos what to do. Skopos gathers data for you on your organisations. It analyses this data for risks on important items like web-servers, web-applications, internal servers, laptops, smartphones, employees and dark-web data.


In the dashboard there is a green shield

You can use it to add any type of item, like websites or smartphones.

Let's add websites and team members. We start with websites first.



Add your websites

Click 'Add Domain' to add a domain. Your organisation should be authorized to scan this domain.

This will add a domain name to the Skopos scanning engine. The domain name will be scanned twice a day for any of the known system vulnerabilities. It will also be tested against all known web application vulnerabilities. You can find a list of vulnerabilities that Skopos tests here OWASP ZAP


After adding a domain name is takes a few hours to perform all tests. You will be alerted of high risks via e-mail.


Importing many websites at once

If you have more than 10 websites we recommend you use the 'Import multiple domains' function. You can use a tool like DNS dumpster.com to find websites related to your organisation.


Under the green shieldclick on 'Import Multiple Domains'. The following screen shows up:


You can download a CSV template to see the format required. Select 'Domain Scan Import' under import type and press Upload. The domain names will be scanned twice a day for any of the known system vulnerabilities. It will also be tested against all known web application vulnerabilities. You can find a list of vulnerabilities that Skopos tests here OWASP ZAP


After adding a domain name is takes a few hours to perform all tests. You will be alerted of high risks via e-mail.



Add team members

Under the green shield on the dashboard click on 'Add Team Member'. The following screen shows up:

For each team member you can provide the first name, last name and e-mail. After you press 'Send invite', the employee receives an e-mail from Skopos with an invitation to install the agent for Windows or Mac. It is a very easy process that can be done by both employee or central IT function. Skopos will immediately scan the dark web for data breaches and credentials where this employee was involved. The data will be used to assess the phishing risk.

Skopos will also use the e-mail address to send employees regularly a questionnaire on cyber awareness, or with your approval, a phishing test.


Once the employee or IT department has installed the Skopos agent on the laptop or desktop, the agent will send a list of all available applications on that device. The data is encrypted and sent a few times a day via a secure connection to the Skopos risk engine. The agent only collects technical information. The Skopos risk will match this software against the Skopos threat database. For new devices this can take up to two hours.


Adding multiple team members at once

If you have more than 10 employees we recommend you use the 'Import multiple team Employees' function. 


Under the green shieldclick on 'Import Multiple Employees'. The following screen shows up:


You can download a CSV template to see the format required. Make sure 'Employee Import' under import type is selected and press Upload. The employees will be invited by Skopos to install the agent. 

Communications

We recommend your send your colleagues a message that they can expect a questionnaire , this massively increase response rates.


What is next?

Skopos will  scan the dark web for data breaches and credentials where these employees were involved. The data will be used to assess the phishing risk. Once the employee or IT department has installed the Skopos agent on the laptop or desktop, the agent will send a list of all available applications on that device. The data is encrypted and sent a few times a day via a secure connection to the Skopos risk engine. The agent only collects technical information. The Skopos risk will match this software against the Skopos threat database. For new devices this can take up to two hours.


Skopos will also use the e-mail address to send employees regularly a questionnaire on cyber awareness, or with your approval, a phishing test.