Phishing Simulation Manual

Overview

Welcome to the Phishing Simulation module. In this section, you'll be guided through the process of using our Phishing Simulation tool. You'll learn how to:

Phishing simulation is a cybersecurity training method where fake phishing emails or messages are sent to employees within an organization to test their ability to recognize and respond to such threats. By mimicking real phishing attempts, these simulations track user interactions, such as clicking on malicious links or entering sensitive information, and provide feedback to improve awareness and prevent actual attacks. This approach helps identify vulnerabilities, educates users on best practices, and enhances overall security by reinforcing the skills needed to detect and handle phishing threats.


Navigate to the module:

image.png

image.png


Phishing Simulation Dashboard:

image.png

image.png

image.png


Simulations Campaign Dashboard:

The dashboard offers a detailed overview of phishing simulation campaigns, showcasing critical information about each campaign's status and performance. It indicates whether a campaign is active and provides the start and end dates. The dashboard also tracks recipient engagement, displaying counts of those who have not opened, opened, visited, or been compromised by the simulations, allowing for effective monitoring and impact assessment.

Additionally, a chart visualizes the percentage of recipients who opened, visited, or were compromised, relative to the total number of simulations conducted. This visualization helps you quickly grasp the effectiveness of your phishing campaigns and their overall impact.

image.png

image.png

image.png

image.png

image.png


Recipients Dashboard:

The recipients dashboard shows all the recipients of an organization that will be monitored during phishing simulations. It shows information such as their full name, status, email address, department in the organization, as well as the click prone percentage. The click prone percentage shows how likely they are to click on phishing emails when simulations are being conducted.

image.png


Add Domain:

Add Recipients:

image.png

image.png

image.png

image.png

Create a Phishing Campaign:

image.png

image.png

image.png

image.png

image.png

image.png

image.png


             If you need further assistance, kindly contact our support at support@cytechint.com for prompt assistance and guidance.


Revision #9
Created 19 April 2024 05:16:47
Updated 21 May 2025 11:32:35 by Richmond Abella