Phishing Simulations Library
Our phishing simulator, PhishSim, includes 1,000s of phishing templates in a variety of attack types and difficulty levels, including drive-by, attachment and data-entry attacks. New templates are added each week, helping you — and your workforce — stay ahead of the latest threats.
Choose from 100s of drive-by phishing simulations to find out which employees are vulnerable to malware and other threats. If your employees take the bait, they’ll receive immediate feedback in the teachable moment. Employee performance is logged for analysis, reporting and threat mitigation.
Hackers often hide malicious content in email attachments. Simulate this common tactic with PhishSim attachment attacks. If your employees open the file, SecurityIQ will log the event and adjust each employees’ security report card accordingly.
Teach your employees the risks of credential theft with SecurityIQ data-entry attacks. If your employees fail the simulation, they will automatically receive additional training targeted to their roles. You can go one step further and enable reply tracking to identify the types of data shared at an individual or team level.
Test your team’s ability to spot a vishing attempt with our interactive vishing simulation tool. If your users interact with the simulation, they will receive training in the teachable moment to reinforce the risks of vishing attacks.
Many of your employees use smart devices for business, making them vulnerable to SMiShing. This new simulation type reinforces the need to scrutinize each SMS for malicious intent and unusual data requests.
Our USB attack simulation will make your team think twice before plugging unknown devices into computers. Any employee interaction with the planted device is logged in SecurityIQ for ongoing tracking and analysis.
Hackers hide malicious macros in common file types to control victims’ computers. Use SecurityIQ to simulate this attack type with any Microsoft Word, PowerPoint or Excel file. SecurityIQ will log all email opens, attachment downloads and macro executions.
BEC attacks cost businesses billions in losses each year. Teach your team how to spot this advanced social engineering attack with dozens of BEC attack templates. Enable reply tracking to determine data types shared in every simulation.
Current Attack Types
We add new phishing templates to SecurityIQ each week to help you stay ahead of new threats.