You are currently viewing as {{ organizationName }} (return to view as {{partnerContext.description || partnerContext.slug}} )

Notifications

No new notifications

Toggle sidebar

{{ service.description }} {{ serviceStateLabel[0] }} Learn more

Status

Notifications View all

  1. {{ item.description }}

Recommendations

Learning to recognize a potential phishing attack is an important part of staying cyber-safe. Ongoing phishing campaigns help keep everyone alert and on the lookout. Over time, recipients learn to recognize phishing emails, driving lower click rates. Phishing Simulations are most effective when unannounced which makes it best not to share information in advance of campaigns with team members. For anyone fooled after several simulations, consider reviewing the risks and best practices to help improve posture.

Key insights

  • {{ s.description }} - {{ s.content }}

{{ service.reports?.description || 'Results' }}

Phishing Simulations #icon-phishing-simulations-38 linearGradient stop { stop-color: var(--icon-color-secondary, #82b3e4); } #icon-phishing-simulations-38 #envelope-seal-gradient-38 stop { stop-color: var(--icon-color-primary, #0352a0); } .stopped { stop-opacity: 0; } .icon-hook { fill: var(--icon-color-secondary, #82b3e4); } .hook-bend-38 { fill: url(#hook-bend-gradient-38); } .envelope { fill: var(--icon-color-primary, #0352a0); } .envelope-seal-38 { fill: url(#envelope-seal-gradient-38); }

Activate Phishing Simulations

The next step in activating Phishing Simulations is to enroll the people you want to include in your campaigns.
Once that’s done, monthly phishing campaigns and regular reporting will commence.
And that’s it, you’ll be off and running!

Phishing Simulations #icon-phishing-simulations-39 linearGradient stop { stop-color: var(--icon-color-secondary, #82b3e4); } #icon-phishing-simulations-39 #envelope-seal-gradient-39 stop { stop-color: var(--icon-color-primary, #0352a0); } .stopped { stop-opacity: 0; } .icon-hook { fill: var(--icon-color-secondary, #82b3e4); } .hook-bend-39 { fill: url(#hook-bend-gradient-39); } .envelope { fill: var(--icon-color-primary, #0352a0); } .envelope-seal-39 { fill: url(#envelope-seal-gradient-39); }

What can {{ service.description }} do for you?

Phishing attacks are one of the most common methods used by cybercriminals to steal information and infiltrate networks. Email spoofing and targeted email attacks (i.e. phishing) seek to provoke unsuspecting users into clicking bad links, surrendering personal information, and installing viruses and malware.

With Defendify, send unannounced phishing emails to everyone enrolled, and if they take the bait, Defendify will provide immediate education at the point of failure with a quick video. Spot-testing email recipients is a great way to reinforce best practices while enabling key tracking, metrics, and reporting around user engagement.

Phishing Simulations

Activate Phishing Simulations

Activating automated Phishing Simulations is a simple two-step process.

First, select the people you'd like to receive phishing campaigns (at least one person to get started).

Then, verify deliverability to ensure phishing simulation emails sent by Defendify are received (i.e. not getting caught or blocked by web/email filtering systems).

After that, monthly phishing simulation campaigns and reporting will begin and run automatically.