go top

Introduction

Simulate actual phishing emails to check user security awareness.
Along with educational training to raise employees' security awareness, reduce the relative risk of social engineering attacks.

Service Features

  • icon
    Simulate the leaking of corporate email lists; hackers use phishing emails to try to get corporate employees to execute attached files in the emails or enter their account and password into phishing websites.
  • icon
    User actions that can be recorded by the service include: opening emails, clicking links, entering data into phishing websites, and executing attachment files.

Project Execution Process

figure