Phished explained

Find out how our AI-driven phishing simulations train every recipient based on his personal knowledge level.

Automated Phishing Simulations

Our comprehensive platform sends phishing simulations in a fully automated way throughout the year, without having to intervene as an organization. No need to think about what kind of phishing attacks there are and how your organization can best educate its employees against them.

Or checkout our pricing page →

STEP 1:

Create an account

Start the journey by creating a free account. You’ll be guided through the configuration phase by an easy-to-use wizard that helps us get to know you and your organization better. 

STEP 2:

Upload recipients

Once the initial setup is done, the real work begins: uploading recipients. This can be done manually, via mass file upload or via an API. You can decide on whether or not to notify recipients about their admission to the program.

STEP 3:

Done!

Excellent, we’re done! The algorithms will start sending out simulations within 24 hours to each recipient. Based on their response, the type and hour of simulations are adapted for everyone.
You can read more about how it works for recipients here.

Automated simulations

Advanced phishing simulations that are personalised for every recipient.

Manual simulations

Create your own simulations using an advanced but easy to use editor.

Unique Templates

A daily-updated library of over 3.000 unique phishing templates.

Spear phishing

Spear phishing, CEO fraud, NSFW, industry related, job related, …

… and even smishing!

Advanced reporting

Keep an eye on the status of all your recipients and your organization.

3 Languages

Automated simulations can be delivered in 3 languages: Dutch, English and French.

What does Phished look like?

Take a closer look at the pages that are being used the most.

    Recipient's week

    The program’s objective is to make phishing experts out of everyone, and this page allows you to track how it’s going on a per recipient basis.

    Ready to start using these functionalities?

    List with uploaded users

    Overview of all the recipients that where uploaded by the administrator. Number of recipients depends on your contract. Possibility to create as many administrators as the number of recipients.

    Import several users at once by using our bulk upload tool (XLSX or CSV format) or by using our API.

    Dashboard

    The start screen is specifically created so you immediately get an overview of all the most important metrics. 

     External validation and certifications

    In addition to our extensive internal scanning and testing programs, we implement best practices to maintain full compliance and memberships.

    SOC certification

    Application servers and data are stored at google datacenters, which are among others SOC 1, SOC 2 and SOC 3 certified.

    ISO 27001-compliant facilities

    Application servers and data are stored at google datacenters, which are among others ISO 27001, ISO 27017.

    SHA256 encryption

    All personal data is stored in SHA256 encrypted databases with rotating keys and is inaccessible to non-authorized personel.

    3rd party penetration test

    Security testing is done on a continuous basis with the help of certified ethical hackers.

    Industries

    We Serve a Variety of Businesses & Industries

    Phishing awareness programs can be used in every sector and every company. It complies with all sector-specific regulations. Cyber security awareness is necessary for every company, large or small.

    Or checkout our pricing page →

    Technology

    Higher Education

    Critical Infrastructure

    Legal & Professional Services

    Energy / Utilities

    Health Care

    Government

    Finance

    Contact us

    +32 (0)53/31.97.55

    3000 Leuven, Belgium

    Protect your organisation

    Train your employees for two weeks with automated phishing simulations that put your best to the test.