Skip to Main Content
Strengthen your email security practices with 50% off e-learning | Shop now
Meet the Hacker: Simulated Phishing Programme

Meet the Hacker: Simulated Phishing Programme

SKU: 6116
Format: Meet the hacker
  • Assess your staff’s awareness of phishing threats with our unique simulated phishing programme.
  • Combines interactive training, simulated phishing attacks and a session with an ethical hacker to significantly improve your organisation’s overall resilience to phishing attacks.
  • Use our expertise to help your staff understand how to protect you better.
  • Supports compliance with ISO 27001, the DPA (Data Protection Act) 2018, the GDPR (General Data Protection Regulation) and the PCI DSS (Payment Card Industry Data Security Standard).
For more information about this service or to get a tailored quote for your organisation, please enquire below and one of our experts will be in touch shortly.Enquire about this service
Description

Meet the hacker

This service offers a comprehensive approach to enhancing your organisation’s resilience against phishing attacks. It includes a simulated phishing programme that assesses staff awareness, combines interactive training and features a session with an ethical hacker.

Employees receive personalised feedback on their vulnerabilities, practical advice on phishing detection and a clear understanding of how to protect your organisation better. The service supports compliance with key regulations like ISO 27001 and the GDPR, ensuring your business is not only secure but also compliant.

Download the full service description


Benefits

  • Identify and understand your staff’s awareness of phishing.
  • Determine which employees require additional phishing training – an effective way to change end-user behaviour.
  • Use our expertise to help your staff understand how to protect you better.
  • Recognise the business impacts presented by human vulnerabilities.
  • Supports compliance with ISO 27002, the DPA 2018 and the GDPR, the PCI DSS, and other laws, regulations and contractual obligations.
  • Protect brand loyalty and corporate image by reducing the likelihood of a security breach.

Process

A typical engagement will go through the following stages:

  1. Pre-engagement consultation
  2. Simulated phishing campaign
    1. Select your type of attack
    2. Define targets and metrics
    3. Execute the test and compile the results
  3. Interactive elearning, showing employees how to identify phishing scams and how to mitigate the threat of an attack
  4. Second phishing campaign
  5. Meet the hacker session for those who have repeatedly fallen victim to phishing attacks
  6. Third and final phishing campaign
  7. Report, including assessment details and findings

Download the full service description

Conditions

Why choose us?

  • Our experienced, CREST-certified penetration testing team has been operational since 2010, amassing extensive testing experience that ensures clients receive a comprehensive service.
  • Get one-to-one expert advice at any stage of the engagement, along with an end-of-programme debrief and answers to queries following the issue of the report.
  • Our transparent proposals are fixed price, so you won’t get any surprises.
  • You will have access to a dedicated account manager throughout the project.
  • Our expertise, your peace of mind.

Eligibility

This service is suitable for organisations that want to understand their staff’s awareness levels or test the effectiveness of their phishing training.

Our standard service will be crafted according to your needs to target up to 1,200 users with a single template for all users, and track users who downloaded the image, clicked the link and submitted data. If you would like to assess a larger number of users or conduct a more complex simulation, please contact us.


Conditions

  • The phishing staff awareness elearning subscription is valid for the duration of the programme and can be renewed annually thereafter for an additional fee. This can be cancelled at any time, according to our terms and conditions.

Customer Reviews

top
Loading...