With over two decades in information protection, your organization’s email security assessment is in capable hands with our team. From initial setup to post-evaluation guidance, we handle the entire process.
At BSM, client collaboration is our priority. Rather than rushing through assessments, we focus on ensuring each evaluation proceeds smoothly and delivers positive outcomes. We collaborate with you to make every security awareness test beneficial.
Below, you’ll find information about our various service options, what to expect during our partnership, and testimonials from previous clients. Unsure if email security testing is right for you? Feel free to request information without any commitment or reach out directly. We’re always available to discuss your specific needs.
Wide choice from a selection of existing scenarios with the possibility to adapt texts to the needs of your company. All our scenarios contain name spoofing: the phishing email appears to be sent by someone within the organization, even though this is not the case. We think along with every choice and advise what best suits your organization.
✔ Quickly get a clear picture of the phishing awareness within your organization
✔ Useful for periodic testing
✔ Starts within one to two working days
For the fully custom test, we build a phishing website completely tailored to your needs. This way we can replicate your company’s login portal and increase the difficulty level of the phishing test. Name spoofing can also be used, just like with the semi-custom phishing test.
For all our tests, privacy is central. All passwords that come in are stripped in a robust way. This way, we can only see the length of a password, and the first two characters. All data also remains on our own servers.
✔ For when your colleagues need more of a challenge
✔ Realistic scenarios; some hackers use the same techniques
✔ Essential for companies with a high risk of targeted phishing attacks
✔ Starts within a week
In advanced phishing simulations, we actually proceed to ‘hack’ your employees during the test, for example by actually using the received passwords or by luring your employees into a remote session via email and telephone. Our software is set up during Advanced phishing so that passwords are received by us.
We can make these scenarios as sophisticated as desired. For example, we have managed to 2FA van Microsoft te omzeilen.
✔ For persons with a high position or high risk within your organization
✔ For companies that place a high value on privacy and data protection
✔ Ideal for improving your security protocols
You can request a phishing test without obligation. We always contact you first. This way, we can answer any questions or think about which scenario best suits your organization.
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✘
✓
✓
✘
✓
✓
✘
✘
✓
✘
✘
✓
1 – 2 days
5 days
5 – 10 days