Phishing Challenge Co-Creation

Phishing is still the biggest information security risk for (local) government.

Phishing is still the biggest information security risk for (local) government.

During the Phishing Challenge, end users are first educated on the risks of phishing. Then it is up to them to identify 5 genuine phishing attempts. In closing, participants are asked to walk through the reporting process.

Get started and deploy the Phishing Challenge Co-creation, in your own corporate style. Want to get an idea in advance of what your Phishing Challenge will look like? Experience the Fishing Challenge of the fictitious municipality safely together via this link.

EXAMPLE REPORTING PROCESS

We put the Phishing Challenge in your corporate style. All we need from you is your reporting process so we can take participants through your reporting process. So complete your reporting process below as well. Example:

1. Go to the intranet of *organization name*
2. Click on ‘regulate yourself’ and ‘report incidents’
3. Scroll to “Data breach.
4. Finalize the notification

The result

Employees recognize phishing attempts better. They learn what to look for when making requests by e-mail and SMS. In addition, employees can practice the reporting process.

Upon completion of the campaign, you will receive, upon request, a report with the anonymous outcomes of your government agency. This will allow you to be even more responsive to your colleagues’ challenges and data-driven reporting.

How do you sign up?

By filling out your contact information and reporting process below, you sign up for the updated version of the Phishing Challenge.

After registering, you will receive your own Phishing Challenge in your house style in the mail after no more than two business days.

Senior communicatieadviseur gemeentelijk overheid, Dick de Jager
Free demo
Request a free demo!

Schedule a demo at your convenience

Also check out our
other courses

No data was found