Phishing is still the biggest information security risk for (local) government.
During the Phishing Challenge, end users are first educated on the risks of phishing. Then it is up to them to identify 5 genuine phishing attempts. In closing, participants are asked to walk through the reporting process.
Get started and deploy the Phishing Challenge Co-creation, in your own corporate style. Want to get an idea in advance of what your Phishing Challenge will look like? Experience the Fishing Challenge of the fictitious municipality safely together via this link.
EXAMPLE REPORTING PROCESS
We put the Phishing Challenge in your corporate style. All we need from you is your reporting process so we can take participants through your reporting process. So complete your reporting process below as well. Example:
1. Go to the intranet of *organization name*
2. Click on ‘regulate yourself’ and ‘report incidents’
3. Scroll to “Data breach.
4. Finalize the notification
The result
Employees recognize phishing attempts better. They learn what to look for when making requests by e-mail and SMS. In addition, employees can practice the reporting process.
Upon completion of the campaign, you will receive, upon request, a report with the anonymous outcomes of your government agency. This will allow you to be even more responsive to your colleagues’ challenges and data-driven reporting.
How do you sign up?
By filling out your contact information and reporting process below, you sign up for the updated version of the Phishing Challenge.
After registering, you will receive your own Phishing Challenge in your house style in the mail after no more than two business days.
“Very good and fun: I’ve done this kind of thing before and this one finally didn’t even feel like a must do, this one was just fun! It is accessible, contains some great examples and not a surplus of open doors.”
Senior communicatieadviseur gemeentelijk overheid, Dick de Jager