With more than twenty years of experience in cyber security, your next phishing test is in good hands with us. From setting up a phishing test to the guidance afterward, we do all the work.
At BSM, communication with the customer is central. For us, it’s not about completing each phishing test as quickly as possible, but about ensuring that each phishing test proceeds as well and positively as possible. We think along with you to make every phishing test a success.
On this page, you can read more about the different options we offer, what you can expect if you do a phishing test with us, and you can see what customers say about us. Not sure if you need a phishing simulation? You can always request a phishing test without obligation or contact us. We are happy to think along with you.
Wide choice from a selection of existing scenarios with the possibility to adapt texts to the needs of your company. All our scenarios contain name spoofing: the phishing email appears to be sent by someone within the organization, even though this is not the case. We think along with every choice and advise what best suits your organization.
✔ Quickly get a clear picture of the phishing awareness within your organization
✔ Useful for periodic testing
✔ Starts within one to two working days
For the fully custom test, we build a phishing website completely tailored to your needs. This way we can replicate your company’s login portal and increase the difficulty level of the phishing test. Name spoofing can also be used, just like with the semi-custom phishing test.
For all our tests, privacy is central. All passwords that come in are stripped in a robust way. This way, we can only see the length of a password, and the first two characters. All data also remains on our own servers.
✔ For when your colleagues need more of a challenge
✔ Realistic scenarios; some hackers use the same techniques
✔ Essential for companies with a high risk of targeted phishing attacks
✔ Starts within a week
In advanced phishing simulations, we actually proceed to ‘hack’ your employees during the test, for example by actually using the received passwords or by luring your employees into a remote session via email and telephone. Our software is set up during Advanced phishing so that passwords are received by us.
We can make these scenarios as sophisticated as desired. For example, we have managed to 2FA van Microsoft te omzeilen.
✔ For persons with a high position or high risk within your organization
✔ For companies that place a high value on privacy and data protection
✔ Ideal for improving your security protocols
You can request a phishing test without obligation. We always contact you first. This way, we can answer any questions or think about which scenario best suits your organization.
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✘
✓
✓
✘
✓
✓
✘
✘
✓
✘
✘
✓
1 – 2 days
5 days
5 – 10 days
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.