Phishing Simulations Library

Our phishing simulator, PhishSim, includes 1,000s of phishing templates in a variety of attack types and difficulty levels, including drive-by, attachment and data-entry attacks. New templates are added each week, helping you — and your workforce — stay ahead of the latest threats.

Drive-By Attacks

Drive-By Attacks

Choose from 100s of drive-by phishing simulations to find out which employees are vulnerable to malware and other threats. If your employees take the bait, they’ll receive immediate feedback in the teachable moment. Employee performance is logged for analysis, reporting and threat mitigation.

Attachment Attacks

Attachment Attacks

Hackers often hide malicious content in email attachments. Simulate this common tactic with PhishSim attachment attacks. If your employees open the file, SecurityIQ will log the event and adjust each employees’ security report card accordingly.

Data-Entry Attacks

Data-Entry Attacks

Teach your employees the risks of credential theft with SecurityIQ data-entry attacks. If your employees fail the simulation, they will automatically receive additional training targeted to their roles. You can go one step further and enable reply tracking to identify the types of data shared at an individual or team level.

Coming Soon
Vishing Simulations

Vishing Simulations

Test your team’s ability to spot a vishing attempt with our interactive vishing simulation tool. If your users interact with the simulation, they will receive training in the teachable moment to reinforce the risks of vishing attacks.

Coming Soon
SMiShing Simulations

SMiShing Simulations

Many of your employees use smart devices for business, making them vulnerable to SMiShing. This new simulation type reinforces the need to scrutinize each SMS for malicious intent and unusual data requests.

USB Attacks

USB Attacks

Our USB attack simulation will make your team think twice before plugging unknown devices into computers. Any employee interaction with the planted device is logged in SecurityIQ for ongoing tracking and analysis.

Macro Attacks

Macro Attacks

Hackers hide malicious macros in common file types to control victims’ computers. Use SecurityIQ to simulate this attack type with any Microsoft Word, PowerPoint or Excel file. SecurityIQ will log all email opens, attachment downloads and macro executions.

BEC Attacks

BEC Attacks

BEC attacks cost businesses billions in losses each year. Teach your team how to spot this advanced social engineering attack with dozens of BEC attack templates. Enable reply tracking to determine data types shared in every simulation.

Current Attack Types

Current Attack Types

We add new phishing templates to SecurityIQ each week to help you stay ahead of new threats.

Designing a Security Champion Program

Designing a Security Champion Program

We believe you'll improve the reach and integrity of your security awareness training with insights from Gartner. Build and empower your squad of security champs today!

Read the Report

Are Your Employees Vulnerable to Phishing?

Find out with a free phishing diagnostic test — no commitment needed!

Get Started

Get to know SecurityIQ in just 30 minutes.

Request a Demo
Get a Demo
Get a Demo