{"id":2633,"date":"2024-10-22T15:22:26","date_gmt":"2024-10-22T15:22:26","guid":{"rendered":"https:\/\/www.hackmosphere.fr\/phishing\/"},"modified":"2025-06-06T12:18:48","modified_gmt":"2025-06-06T12:18:48","slug":"phishing","status":"publish","type":"page","link":"https:\/\/www.hackmosphere.fr\/en\/phishing\/","title":{"rendered":"Phishing"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; next_background_color=&#8221;#ffffff&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_direction=&#8221;137deg&#8221; background_color_gradient_stops=&#8221;#1a1a31 0%|#0b4650 100%&#8221; background_image=&#8221;https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2024\/10\/PATTERN-HEADER.png&#8221; background_position=&#8221;top_left&#8221; background_horizontal_offset=&#8221;100%&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;8vw||8vw||false|false&#8221; custom_padding_tablet=&#8221;15vw||15vw||true|false&#8221; custom_padding_phone=&#8221;20vw||20vw||true|false&#8221; bottom_divider_style=&#8221;asymmetric&#8221; background_last_edited=&#8221;on|phone&#8221; background_enable_image_phone=&#8221;off&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;c4d64208-0f63-40a8-bbdd-efdc4f45c38b&#8221; header_text_color=&#8221;#FCFCFC&#8221; custom_margin=&#8221;||||false|false&#8221; header_2_text_align_tablet=&#8221;center&#8221; header_2_text_align_phone=&#8221;left&#8221; header_2_text_align_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>PHISHING<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;04aefc12-0bc2-42e3-86c5-dd2d05a7cf91&#8243; header_2_text_color=&#8221;#FCFCFC&#8221; width=&#8221;44%&#8221; width_tablet=&#8221;100%&#8221; width_phone=&#8221;100%&#8221; width_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Your employees can compromise your security<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; width=&#8221;68%&#8221; width_tablet=&#8221;100%&#8221; width_phone=&#8221;100%&#8221; width_last_edited=&#8221;on|tablet&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Identify human vulnerabilities and train your staff in cybersecurity with our phishing campaigns. Evaluate the percentage of your staff who click on malicious attachments or links.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE3ODAiLCJlbmFibGVfaHRtbCI6Im9mZiJ9fQ==@&#8221; button_text=&#8221;Request a quote&#8221; admin_label=&#8221;row&#8221; _builder_version=&#8221;4.25.1&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;16px&#8221; button_text_color=&#8221;#1A1A31&#8243; button_bg_color=&#8221;#01DC94&#8243; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;12px&#8221; button_font=&#8221;Inter||||||||&#8221; button_icon=&#8221;&#x24;||divi||400&#8243; button_icon_color=&#8221;#1A1A31&#8243; button_on_hover=&#8221;off&#8221; custom_padding=&#8221;10px|50px|10px|30px|true|false&#8221; global_module=&#8221;2077&#8243; saved_tabs=&#8221;all&#8221; global_colors_info=&#8221;{}&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_color__hover=&#8221;#B7F7CC&#8221; button_bg_enable_color__hover=&#8221;on&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;20px||20px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;74f91c42-4ba7-4cbe-881f-bf82609ea1e5&#8243; header_3_text_align=&#8221;center&#8221; header_3_text_color=&#8221;#1A1A31&#8243; width=&#8221;100%&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||10px||false|false&#8221; header_3_text_align_tablet=&#8221;left&#8221; header_3_text_align_phone=&#8221;left&#8221; header_3_text_align_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><span style=\"font-weight: 400;\">Test your employees&#8217; resilience to phishing attempts<br \/><\/span><\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; text_text_color=&#8221;#1A1A31&#8243; text_orientation=&#8221;center&#8221; width=&#8221;73%&#8221; width_tablet=&#8221;100%&#8221; width_phone=&#8221;100%&#8221; width_last_edited=&#8221;on|phone&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||||false|false&#8221; text_orientation_tablet=&#8221;left&#8221; text_orientation_phone=&#8221;left&#8221; text_orientation_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>For each campaign, we set up a dedicated infrastructure and acquire a domain name, ensuring tailor-made real-world attack scenarios.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;rgba(173,173,173,0.15)&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; custom_padding_tablet=&#8221;||||true|true&#8221; custom_padding_phone=&#8221;||||true|true&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_horizontal__hover_enabled=&#8221;on|hover&#8221; box_shadow_blur__hover_enabled=&#8221;on|desktop&#8221; box_shadow_blur__hover=&#8221;20px&#8221;][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;11c3e866-10b0-4768-9648-3cd08582c530&#8243; text_font=&#8221;Inter|600|||||||&#8221; text_text_color=&#8221;#FCFCFC&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#1A1A31&#8243; header_4_font=&#8221;Inter|||on|||||&#8221; header_4_text_color=&#8221;#1A1A31&#8243; header_4_font_size=&#8221;14px&#8221; custom_margin=&#8221;||5px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4>MASS EMAILING<\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;11c3e866-10b0-4768-9648-3cd08582c530&#8243; header_4_text_color=&#8221;#1A1A31&#8243; width=&#8221;100%&#8221; width_tablet=&#8221;78%&#8221; width_phone=&#8221;78%&#8221; width_last_edited=&#8221;on|desktop&#8221; custom_margin=&#8221;||5px||false|false&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h5><span style=\"font-weight: 400;\">Simulate large-scale phishing campaigns<br \/><\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; text_text_color=&#8221;#1A1A31&#8243; width=&#8221;94%&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p style=\"text-align: justify;\">We create realistic emails imitating authentic communications, enabling you to test your employees&#8217; vigilance.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; disabled_on=&#8221;on|on|off&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||||true|true&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_horizontal__hover_enabled=&#8221;on|hover&#8221; box_shadow_blur__hover_enabled=&#8221;on|desktop&#8221; box_shadow_blur__hover=&#8221;20px&#8221;][et_pb_image src=&#8221;https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2024\/10\/phishing.jpg&#8221; alt=&#8221;Image of someone on his emails&#8221; title_text=&#8221;Phishing&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;118%&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;rgba(173,173,173,0.15)&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_horizontal__hover_enabled=&#8221;on|hover&#8221; box_shadow_blur__hover_enabled=&#8221;on|desktop&#8221; box_shadow_blur__hover=&#8221;20px&#8221;][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;11c3e866-10b0-4768-9648-3cd08582c530&#8243; text_font=&#8221;Inter|600|||||||&#8221; text_text_color=&#8221;#FCFCFC&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#1A1A31&#8243; header_4_font=&#8221;Inter|||on|||||&#8221; header_4_text_color=&#8221;#1A1A31&#8243; header_4_font_size=&#8221;14px&#8221; custom_margin=&#8221;||5px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4>SPEAR PHISHING<\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;11c3e866-10b0-4768-9648-3cd08582c530&#8243; header_4_text_color=&#8221;#1A1A31&#8243; width=&#8221;64%&#8221; width_tablet=&#8221;63%&#8221; width_phone=&#8221;63%&#8221; width_last_edited=&#8221;on|desktop&#8221; custom_margin=&#8221;||5px||false|false&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h5><span style=\"font-weight: 400;\">Target the employees of your choice<br \/><\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; text_text_color=&#8221;#1A1A31&#8243; width=&#8221;95%&#8221; width_tablet=&#8221;95%&#8221; width_phone=&#8221;95%&#8221; width_last_edited=&#8221;on|desktop&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p style=\"text-align: justify;\">Target specific employees with personalized emails, to assess their ability to spot phishing attempts.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||||false|false&#8221; custom_padding_tablet=&#8221;||||false|false&#8221; custom_padding_phone=&#8221;20px||20px||true|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;74f91c42-4ba7-4cbe-881f-bf82609ea1e5&#8243; header_3_text_align=&#8221;center&#8221; header_3_text_color=&#8221;#1A1A31&#8243; custom_margin=&#8221;||10px||false|false&#8221; header_3_text_align_tablet=&#8221;left&#8221; header_3_text_align_phone=&#8221;left&#8221; header_3_text_align_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><span style=\"font-weight: 400;\">Test your employees to limit the risk of attack<br \/><\/span><\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; text_text_color=&#8221;#1A1A31&#8243; text_orientation=&#8221;center&#8221; width=&#8221;100%&#8221; width_tablet=&#8221;100%&#8221; width_phone=&#8221;100%&#8221; width_last_edited=&#8221;on|phone&#8221; module_alignment=&#8221;center&#8221; text_orientation_tablet=&#8221;left&#8221; text_orientation_phone=&#8221;left&#8221; text_orientation_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Raise awareness among your employees to help reduce the risk of attack within your company.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||||true|true&#8221; custom_padding_tablet=&#8221;||||true|true&#8221; custom_padding_phone=&#8221;0px|0px|0px|0px|true|true&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_horizontal__hover_enabled=&#8221;on|hover&#8221; box_shadow_blur__hover_enabled=&#8221;on|desktop&#8221; box_shadow_blur__hover=&#8221;20px&#8221;][et_pb_image src=&#8221;https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2024\/10\/cyberse\u0301curite\u0301.png&#8221; alt=&#8221;Cybersecurity icon&#8221; title_text=&#8221;Cybersecurity icon&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;25%&#8221; width_tablet=&#8221;20%&#8221; width_phone=&#8221;25%&#8221; width_last_edited=&#8221;on|phone&#8221; module_alignment=&#8221;left&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;11c3e866-10b0-4768-9648-3cd08582c530&#8243; header_4_text_color=&#8221;#1A1A31&#8243; custom_margin=&#8221;||5px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4><span style=\"font-weight: 400;\">Strengthen your cyber culture<br \/><\/span><\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; text_text_color=&#8221;#1A1A31&#8243; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p style=\"text-align: justify;\">Expose your employees to phishing campaigns, so that they become aware of cyber threats and learn how to identify them. This way, you reinforce their vigilance and limit the human risk. <\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||||true|true&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_horizontal__hover_enabled=&#8221;on|hover&#8221; box_shadow_blur__hover_enabled=&#8221;on|desktop&#8221; box_shadow_blur__hover=&#8221;20px&#8221;][et_pb_image src=&#8221;https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2024\/10\/risque-humain.png&#8221; alt=&#8221;Human risk icon&#8221; title_text=&#8221;Human risk icon&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;25%&#8221; width_tablet=&#8221;20%&#8221; width_phone=&#8221;25%&#8221; width_last_edited=&#8221;on|phone&#8221; module_alignment=&#8221;left&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;11c3e866-10b0-4768-9648-3cd08582c530&#8243; header_4_text_color=&#8221;#1A1A31&#8243; custom_margin=&#8221;||5px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4><span style=\"font-weight: 400;\">Limit human risk<br \/><\/span><\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; text_text_color=&#8221;#1A1A31&#8243; width=&#8221;95%&#8221; width_tablet=&#8221;95%&#8221; width_phone=&#8221;95%&#8221; width_last_edited=&#8221;on|desktop&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p style=\"text-align: justify;\">Tailor your training courses by identifying behavioral flaws and the employees most at risk from cyber-attacks. In this way, you can limit the human risk and improve your security protocols. <\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||||true|true&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_horizontal__hover_enabled=&#8221;on|hover&#8221; box_shadow_blur__hover_enabled=&#8221;on|desktop&#8221; box_shadow_blur__hover=&#8221;20px&#8221;][et_pb_image src=&#8221;https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2024\/10\/sensibilisation.png&#8221; alt=&#8221;Awareness icon&#8221; title_text=&#8221;Awareness icon&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;25%&#8221; width_tablet=&#8221;20%&#8221; width_phone=&#8221;25%&#8221; width_last_edited=&#8221;on|phone&#8221; module_alignment=&#8221;left&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;11c3e866-10b0-4768-9648-3cd08582c530&#8243; header_4_text_color=&#8221;#1A1A31&#8243; custom_margin=&#8221;||5px||false|false&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h4><span style=\"font-weight: 400;\">Improve your cyber posture<br \/><\/span><\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; text_text_color=&#8221;#1A1A31&#8243; width=&#8221;100%&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p style=\"text-align: justify;\">Carry out regular phishing campaigns to assess changes in behavior and adjust your awareness strategies. By anticipating human risk, you can proactively improve your cyber defense. <\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_direction=&#8221;311deg&#8221; background_color_gradient_stops=&#8221;#1a1a31 0%|#0b4650 100%&#8221; custom_padding=&#8221;||||false|false&#8221; custom_padding_tablet=&#8221;||6vw||false|false&#8221; custom_padding_phone=&#8221;50px||50px||true|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;rgba(252,252,252,0.15)&#8221; background_image=&#8221;https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2024\/10\/CTA.png&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;80px|50px|80px|50px|true|true&#8221; custom_padding_tablet=&#8221;80px|50px|80px|50px|true|true&#8221; custom_padding_phone=&#8221;30px|20px|30px|20px|true|true&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;04aefc12-0bc2-42e3-86c5-dd2d05a7cf91&#8243; header_2_text_color=&#8221;#FCFCFC&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2>Ready to raise your employees&#8217; cyber awareness? <\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; width=&#8221;69%&#8221; width_tablet=&#8221;90%&#8221; width_phone=&#8221;100%&#8221; width_last_edited=&#8221;on|tablet&#8221; custom_margin=&#8221;-20px||||false|false&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>Our phishing tests, lasting from 3 to 7 days, start at \u20ac1,500 excluding VAT.<\/p>\n<p>Contact us today for a customized quote tailored to your needs!<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE3ODAiLCJlbmFibGVfaHRtbCI6Im9mZiJ9fQ==@&#8221; button_text=&#8221;Request a quote&#8221; admin_label=&#8221;row&#8221; _builder_version=&#8221;4.25.1&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;16px&#8221; button_text_color=&#8221;#1A1A31&#8243; button_bg_color=&#8221;#01DC94&#8243; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;12px&#8221; button_font=&#8221;Inter||||||||&#8221; button_icon=&#8221;&#x24;||divi||400&#8243; button_icon_color=&#8221;#1A1A31&#8243; button_on_hover=&#8221;off&#8221; custom_padding=&#8221;10px|50px|10px|30px|true|false&#8221; global_module=&#8221;2077&#8243; saved_tabs=&#8221;all&#8221; global_colors_info=&#8221;{}&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_color__hover=&#8221;#B7F7CC&#8221; button_bg_enable_color__hover=&#8221;on&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>PHISHINGYour employees can compromise your securityIdentify human vulnerabilities and train your staff in cybersecurity with our phishing campaigns. Evaluate the percentage of your staff who click on malicious attachments or links.Test your employees&#8217; resilience to phishing attemptsFor each campaign, we set up a dedicated infrastructure and acquire a domain name, ensuring tailor-made real-world attack scenarios.MASS [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_seopress_robots_primary_cat":"0","_seopress_titles_title":"Set phishing campaigns up","_seopress_titles_desc":"Test and improve your employees' cyber security awareness with a phishing campaign.","_seopress_robots_index":"","_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-2633","page","type-page","status-publish"],"_links":{"self":[{"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/pages\/2633","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/comments?post=2633"}],"version-history":[{"count":5,"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/pages\/2633\/revisions"}],"predecessor-version":[{"id":3181,"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/pages\/2633\/revisions\/3181"}],"wp:attachment":[{"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/media?parent=2633"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}