Phishing attack types
Prepare employees for every phishing tactic and deliver training to phished learners based on the attack type they click.
See if your employees take the bait from drive-by attacks built to draw interest, create a sense of urgency and generate a click.
Redirect clicks to a spoofed landing page to see if employees enter login credentials or sensitive information.
Business email compromise (BEC)
Send targeted phishing emails and enable reply tracking to replicate BEC attacks and detect data patterns shared in replies.
Use dynamic variables to include employee name, manager, company information, location and more to simulate targeted attacks.
Malware & malicious attachments
Include attachments and potentially dangerous file types such as .EXE and .DOCM to teach employees the dangers of attachments and malware.
Load Microsoft Word and Excel macro files on your USB drives and record all employee interaction with planted drives.
Phishy Domains & spoofing
Teach your employees the importance of domain verification on every email. Send simulated phishing emails from our library of Phishy Domains™ or add your own to typosquat domains familiar to your employees.
Replicate common domain spoofing techniques with our pre-built landing pages or add custom spoofed domains to provide an additional challenge for employees.
Cybersecurity Culture — Quantified
See the data on the most overlooked variable in security and learn how to measure your organization's cybersecurity culture.