hex logo


Brand Damage occurs when there is a loss of customer trust or when the image becomes tarnished.  Continuous monitoring of a company's brand across social media and the internet is critical to maintaining brand success.


PQ-INTEL has the ability to continuously monitor your brand, partners, affiliates, sponsorships, your executives and your loyal customer base to provide your teams with ultimate success in protecting brand perception and engagement. We do this through our automation across all 5 Top social media channels and various additional open sources found on the internet and dark web.   PQ-INTEL directs strategic planning from an informed position.
We identify trends and persons of interest related to any social media conversation, groups conversations to see the comparisons between narratives, and identify key attributes and activities.
Our Authenticity Scoring quantifies Real From Fake in Social Media Conversations. Until now, it was nearly impossible to discern how much of a social media narrative is real vs. artificially manipulated and amplified.

We mitigate the impact of the following threats;

§  Business Email Compromise (BEC)
Between 2016-2019 BEC cost enterprise $26 billion worldwide. It is by far the most financially damaging of online crimes. It also self reportedly by SOC and security professionals worldwide, has the largest gap between efficacy of solutions to mitigate and frequency of these types of attack tactics. It exploits the fact that so many of us rely on email to conduct business-both personal and professional. The criminals send messages that appear to come from known sources making a legitimate request. Enter Insider threat and human error. The one training segment all organizations struggle with.

§  Social Media account Impersonation
Fake social media accounts are used by threat actors to entice customers to click unsecure redirect links or damage a brands reputation. These actors will replicate the brand logo and introduce typo-squatting into the brand names to fool users.  

§  Executive or Supplier Impersonation
Threat actors create this type of impersonation to entice lower-level employees to release funds or sensitive documents. This is typically used in spear phishing campaigns but is also used within social media to target customers and employees.

§  Domain Impersonation
The most common form of impersonation is a spoof domain, which sees a threat actor use a domain to mimic a brand. The attackers employ such a tactic to engineer the end user into thinking the content is legitimate. Phishing templates are widely sold on criminal forums and marketplaces. Both the type of brand and the market sector can determine the likelihood of impersonation.

§ Existing Security Tools Complete Failure
Surely because these existing (Free + Paid) phishing and IT security training simulation tools are not tailored or customized to their end user, there is not a prescriptive approach to education. Suddenly and miraculously everyone across the functional organization, regardless of skill set- learns the same! Are you willing to bet your data security on it? The 'PhishER Alert' type buttons and flags in the email interfaces, turns out - they don't actually stop any attacks, the simply contain them. But it only takes one right? In actual facts, the false positive report rate is through the roof. And the ability to for your workforce to still recognize a true spear phishing attack or email is null. The excessive false reporting leads to a problem of managing timely responses to real phishing attacks! End result- organizations are still getting compromised, time and again by the unsuspecting employee thinking their college bud finally wants to connect. Your brand's sentiment and longevity relies on being able to protect its customers and proprietary data. Why are we not protecting our employees privacy and data, first?

Get Started Today

Direct Access to key Exposure Points that can affect your Brand
Request a Demo