How susceptible are you to phishing? Try a simulated attack and find out.
Cognisys can perform simulated phishing to determine the susceptibility of your people to this type of cyber risk.
Working with you to devise a range of scenarios, we will build a series of personalised phishing emails to target specific groups within your organisation.
Typically, the emails will invite recipients to take certain actions, such as giving away sensitive information or downloading malicious payloads allowing unauthorised access to your environment.
Sophisticated to simple phishing tests are carried out to determine the security awareness of your employees and understand the strength of your security culture.


Phishing, Spear-Phishing and Whaling
Phishing generally targets organisations or individuals at random, whereas spear-phishing is more focused on specific individuals. Whaling is a term describing the targeting of high-ranking executives in an organisation.
In the case of whaling and phishing, all employees, and not just high-level executives, should be trained about these attacks and how to identify them.
Preventing cybersecurity threat requires all employees to take responsibility for protecting the organisation’s assets.
How susceptible are you to phishing? Try a simulated attack
and find out.
Cognisys can perform simulated phishing to determine the susceptibility of your people to this type of cyber risk.
Working with you to devise a range of scenarios, we will build a series of personalised phishing emails to target specific groups within your organisation.
Typically, the emails will invite recipients to take certain actions, such as giving away sensitive information or downloading malicious payloads allowing unauthorised access to your environment.
Sophisticated to simple phishing tests are carried out to determine the security awareness of your employees and understand the strength of your security culture.
Remediate
-
Understand how to better defend your organisation using a layered defence approach.
- Provide cyber security awareness training for your employees.
- Build an effective cyber threat reporting culture, with a ‘no-blame’ approach for maximum uptake, throughout your organisation.
Method
The goal of a simulated phishing attack is to trick an individual into disclosing personal or corporate information through social engineering, email spoofing and content spoofing efforts.
For example, we may send the victim an email that appears to be from a trusted source, including links back to a customised malicious website that has been created especially for the attack.
Our emails and websites can be highly personalised and customised, incorporating the target’s name, job title or other relevant information.
Identify
- Creation of easy, medium and difficult templates, so as to scale training.
- Identify existing security awareness.
- Training can be built-in to landing pages.
Report
Cognisys presents its findings in a comprehensive yet simple report format.
This typically comprises: an executive summary, methodology, technical findings, and prioritised recommendations for remediation.
Let’s Make Things Happen
Fill the form in and one of our team will be in touch for a no-obligation discussion or quote regarding your requirements
“It was obvious, very quickly, that the Cognisys team knew exactly what they were doing. The speed that they uncovered some major issues justified our selection of them. I’d be more than happy to recommend them.”
Dan Mitchell
Head of IT – Clarion Solicitors