top of page
Dave Spilker

Friendly Phishing Attacks; Train Your Employees


By now, as a business manager you should know it's bad practice to open emails at work that smell “phishy". You probably get the occasional spam messages saying you're being investigated, your service is suspended, or a Prince in Nyrobi has some inheritance to share with you...

However, do your employees and coworkers recognize these fake phishing emails? How can you be sure? Have your employees and co workers gotten the message? If it happens to ANYONE in your company, even if it is NOT YOUR FAULT, did it still happen “ON YOUR DIME”? Does senior management really care when you say, “It wasn’t MY FAULT, it was STEVE who opened that email!”

If it happens to anyone in your company, even if it's not your fault, managers are often the ones to blame.

The Solution: Have Fun Training Your Employees With "Fake" Phishing Scams

What if you could create a “friendly attack” that was perpetrated on your company, and you were able to know everyone was tested, and how they interacted with the fake scam? Not only can it be fun to see who is well-trained to prevent cyber attacks, but it helps employees become aware of their behaviors.

Our company NE-INC has helped hundreds of businesses stay protected with cyber security in the workplace. We can quickly and easily setup a friendly phishing attack to help your company see how well prepared employees are against phishing scams.

Here's how it works:

  1. We use a tool specifically created for this, to create a custom tailored phishing email to be broadcast to your users.

  2. That email is sent out, instructing users to “click here to sign in” or “click here to claim your prize” or whatever you want. There are dozens of templates, we can make them look very convincing!

  3. Statistics are gathered over the next 1-2 weeks, detailing who opened the email, what device they were using when they opened the email, when they opened it, etc.

  4. If they follow the instructions, they can either be immediately told they have fallen for a simulated phishing attack, or the website can just “lock up” and stop working. Either way, the results are reported back to you.

  5. You can then have a talk with the users who follow the instructions, or require they attend further instruction on how to prevent phishing attacks in the future.

The Cost:

We charge a flat rate of $150 for this simulation for up to 200 email users, and we can get you a quote for a larger number of users.

Interested in giving it a try?

Give us a call at (317) 595-6387 or submit a contact request using this form.

54 views0 comments
bottom of page