Simulated phishing is a new ethical hacking and cyber awareness raising service from Blue Rock Cyber Defence.

Phishing is the process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity, using bulk email which tries to evade spam filters.

Emails claiming to be from social web sites, banks, auction sites or IT administrators are commonly used to lure unsuspecting users.

It’s a form of criminally fraudulent social engineering.

When analysing ICO data from 2017-2019, CybSafe discovered that out of 2,400 reported data breaches, over 1,000 of them were initiated by a phishing attack.

Phishing your users will uncover how vulnerable your organisation is to phishing attacks

At Blue Rock, we can use a wide variety of phishing techniques to test your users.  We can tell you if people click on hyperlinks, open attachments or reply to our phishing e-mails. We use this data to reveal how prone your organisation is to such attacks.

We schedule tests are a frequency which is right for your organisation.  We send random phishing templates to each user and we also randomise when those templates are sent – so that means you won’t have users warning each other that a test is taking place.

Don’t worry though – it’s not a real phishing attack and nothing bad will happen.  In fact, users which fail the test will be directed to cyber awareness training materials, e.g. they will be shown what red flags they should have noticed in the phishing e-mail they received.

Here’s how it works

  • We choose a phishing test which suits your business circumstances
  • We choose a landing page your users will see if they click on any links
  • We show users which red flags they missed
  • We provide a report, which reveals how prone your business is to phishing attacks

By putting your users through continual security awareness training like this, they become an active part of your overall cyber defence strategy.  Phishing e-mails no longer get the innocent interaction from users that cyber crooks need.  Instead, your users have a changed mindset that causes them to be suspicious of even the smallest out of place detail.  The end result is phishing becomes less effective as an attack vector.

Find out if you are vulnerable

Talk to us to start the phight back against phishing today.  Send an e-mail to: