Simulated Phishing Service

We perform realistic Phishing Simulations that deliver real-time Security Awareness training to end users and valuable data to IT Management.
Included Increase Cyber Resilience Included “Report Phish” Plug-in
Included Realistic Phishing Emails Included Security Awareness Training
Included Measure Repeat Offenders Included Data-Driven Methodology
Included Zero Resource Required Included Outlook Plug-in
Included 1-Day Setup Included Free Proof of Concept

Proof of Concept

Want a test drive? Let's see how many users click a link...
Please provide your email address below and we'll be in touch shortly.

Simulated Phishing increases Cyber Resilience

Simulated Phishing is a key step to strengthening effective Phishing Defence.

Start by performing a Phishing simulation and gather data on Open Rates and Click Rates and provide instant Computer Based Training to those

The VREE Phishing Defense methodology reduces the click-rate on Phishing emails by providing real-time Security Awareness training.

Hundreds of detailed templates, customised for you

Realistic Campaigns

Thousands of templates that mimic real Phishing attacks, designed to simulate the most basic Spear Phishing attack to advanced targeted attack.

Each template includes bait and a hook which leads to educational material or a separate Learning Management System (LMS).

Hooks and follow-up action include:

  1. A link to a web page that can be:
    • HTML5 Educational Material
    • Falsified Data Entry Form (i.e. Office365 Login Page)
  2. An attachment (Word, Excel, .iso, .img) that can include;
    1. Enable Macro Prompt
    2. Educational Material

 

Simplified Educational Material, all devices, anywhere

Browsed-Based Education

Custom-crafted HTML5 web page education that is optimised for Desktops and Mobile Devices, ensuring that every user that clicks our Phishing links receives education on-the-spot.

Choose from custom browser-based education, videos or integrate with an alternative Learning Management System (LMS).

Malicious

Board and Management Reports

Monthly and Quarterly reporting

Data is generated from Phishing Campaigns to provide Management Information including

  • Who opened the email
  • Who clicked the link
  • Who entered data into forms
  • Who are repeat offenders
  • Who reported phishing emails correctly (using the outlook plug-in)

Demo Below

  • Susceptibility Rate(%)
  • Simulations

Get in touch

Book a free Proof of Concept or request a demonstration..

What is Credential Harvesting?