We use cookies to provide the best experience

We use cookies to offer you the best customer experience. With the help of cookies, we can offer you the information you like about our products and services. If you give your consent to the use of cookies, press the "I accept cookies" button. If you want to manage your cookie preferences, click the "Change cookies" button. Your choice of cookies will be stored for 90 days. Learn more about cookies

Please select and confirm the cookie preferences that suit you:

We use cookies on our website to ensure that important operations and certain functionalities work. Without these cookies, the website will not work properly.

We use marketing cookies to deliver personalized advertising to you. Personal ads allow you to take part in many different campaigns. If you do not wish to receive personal advertisements, you can still visit our website, but the advertisements you see may not be relevant to you.

We use analytical cookies because they help collect data about how many customers use the website, what content they browse and other information necessary to improve the functionality of the website. By using statistical cookies that collect anonymous information, we can learn how visitors reach the website and use the website.

Cyberattack simulation

Investment:

Cyberattack Simulation 900€

Cyber Security Training + Cyberattack Simulation (setup and results report) up to 25 participants €1500
Cyber Security Training + Cyberattack Simulation (setup and results report) up to 26 participants €2000

Microsoft Defender for Office 365 (Plan2) – €5,64 per user/month

Cyberattack Simulation allows you to run realistic attack scenarios that help identify and find vulnerable users before an attack affects the entire organization.

To achieve the best result, we carry out Cyberattack Simulation with Cyber Security Training:

  • 1st Cyberattack Simulation 
  • Cyber Security Training
  • 2nd Cyberattack Simulation

By combining attack simulation and training, the result is a mapping of users who need more attention, ensuring that the weakest links are addressed and excluded.

The simulation tests the security measures with the help of various user-aimed techniques, including:

  • Getting identification information: the attacker sends a message including a URL directing users to a website (often a well-known brand). The goal is to steal sensitive information.
     
  • Malware attachment: the attacker sends the recipient a message with an attachment that, once opened, executes a random code on the user’s device, so that the attacker can dig even deeper in the company network.
     
  • Attached link: a hybrid message where the attacker sends an e-mail with a URL attached.
     
  • Malware link: the attacker sends a message containing a link to a file sharing site known by the user (e.g., SharePoint Online or Dropbox). Clicking on the link releases a random code that enables the attacker to infiltrate into the network of the company.
     
  • Drive-by-URL: the attacker sends a message containing a URL that, once clicked, takes to a web page that in turn attempts to execute a background code to collect information about the recipient or launch a random malicious code in their device.

Ask for an offer

Download product sheet