A comprehensive step-by-step guide to creating and launching an effective phishing simulation
Phishing simulations are a critical component of security awareness training. By safely mimicking real-world phishing attacks, you can identify vulnerable users, measure your organization's susceptibility to phishing, and provide immediate education to those who fall for simulated attacks.
This guide will walk you through creating your first phishing campaign with PhishFortress, from planning to execution and analysis.
Before creating your campaign in the platform, it's important to define your objectives and approach:
Follow these steps to create your first phishing campaign in PhishFortress:
Navigate to the Campaigns section in the sidebar and click "Create New Campaign".
Enter the basic information for your campaign:
Choose a phishing template from the library or create a custom template:
Browse the template library and filter by category, difficulty, or industry:
Select which users will receive the phishing simulation:
Set up the training experience for users who click on phishing links:
Review all campaign settings and prepare for launch:
While your campaign is active, monitor its progress and be prepared to address any issues:
Use the campaign dashboard to track key metrics in real-time:
Be ready to handle questions and concerns:
Be prepared to make changes if necessary:
After your campaign concludes, analyze the results to gain insights and plan next steps:
Based on your campaign results, consider these follow-up actions:
Assign additional security awareness training to users who clicked on phishing links, focusing on the specific tactics used in your simulation.
Create a summary report for leadership highlighting key findings, risk areas, and recommendations for improving security awareness.
Develop a regular schedule for phishing simulations, gradually increasing difficulty and varying the tactics used to build comprehensive awareness.
Evaluate if your security policies need updates based on campaign findings, particularly around reporting procedures and handling suspicious emails.