Skip to Main Content
USA
Select regional store:
Get ahead in Cloud security – save 25% on selected training courses. Find out more.
Meet the Hacker: Simulated Phishing Programme

Meet the Hacker: Simulated Phishing Programme


SKU: 6116
Format: Meet the hacker
  • Assess your staff’s awareness of phishing threats with our unique simulated phishing programme.
  • Combines interactive training, simulated phishing attacks and a session with an ethical hacker to significantly improve your organisation’s overall resilience to phishing attacks.
  • Use our expertise to help your staff understand how to protect you better.
  • Supports compliance with ISO 27001, the DPA (Data Protection Act) 2018, the GDPR (General Data Protection Regulation) and the PCI DSS (Payment Card Industry Data Security Standard).

 

Inquire now

NCSAM: Defend your organization with our expert solutions. Use code NCSAM24 at checkout and save 15%. T&C’s apply*

CALL TO ORDER
Description

Meet the hacker

This service offers a comprehensive approach to enhancing your organization’s resilience against phishing attacks. It includes a simulated phishing program that assesses staff awareness, combines interactive training, and features a session with an ethical hacker.

Employees receive personalized feedback on their vulnerabilities, practical advice on phishing detection, and a clear understanding of how to protect your organization better. The service supports compliance with key regulations like ISO 27001 and the GDPR, ensuring your business is not only secure but also compliant.

Download the full service description


Benefits

  • Identify and understand your staff’s awareness of phishing
  • Determine which employees require additional phishing training – an effective way to change end-user behavior
  • Use our expertise to help your staff understand how to protect you better
  • Recognize the business impacts presented by human vulnerabilities
  • Supports compliance with ISO 27002, the DPA 2018 and the GDPR, the PCI DSS, and other laws, regulations, and contractual obligations
  • Protect brand loyalty and corporate image by reducing the likelihood of a security breach

Process

A typical engagement will go through the following stages:

  1. Pre-engagement consultation
  2. Simulated phishing campaign
    1. Select your type of attack
    2. Define targets and metrics
    3. Execute the test and compile the results
  3. Interactive elearning, showing employees how to identify phishing scams and how to mitigate the threat of an attack
  4. Second phishing campaign
  5. Meet the hacker session for those who have repeatedly fallen victim to phishing attacks
  6. Third and final phishing campaign
  7. Report, including assessment details and findings

Download the full service description

Conditions

Why choose us?

  • Our experienced, CREST-certified penetration testing team has been operational since 2010, amassing extensive testing experience that ensures clients receive a comprehensive service
  • Get one-to-one expert advice at any stage of the engagement, along with an end-of-program debrief and answers to queries following the issue of the report
  • Our transparent proposals are fixed price, so you won’t get any surprises
  • You will have access to a dedicated account manager throughout the project
  • Our expertise, your peace of mind

Eligibility

This service is suitable for organizations that want to understand their staff’s awareness levels or test the effectiveness of their phishing training.

Our standard service will be crafted according to your needs to target up to 1,200 users with a single template for all users, and track users who downloaded the image, clicked the link, and submitted data. If you would like to assess a larger number of users or conduct a more complex simulation, please contact us.


Conditions

  • The phishing staff awareness elearning subscription is valid for the duration of the programme and can be renewed annually thereafter for an additional fee. This can be cancelled at any time, according to our terms and conditions.

Customer reviews

top
This website uses cookies. View our cookie policy
Risk Assessment
Workshop
Oct 22
Loading...