0
You have no items in your shopping cart.
Search

Cyber Security & Data Privacy - Simulated Phishing Tests

HRdirect has partnered with Clear Law Institute to provide simulated phishing tests. These simulations are crucial in training staff how to prevent and report phishing attacks. Both large and small companies can fall prey to phishing schemes. It's good to test your staff's readiness and train employees on how to handle these situations.


A simulated phishing attack involves a harmless simulated phishing email sent to all of your organization’s employees or to specific divisions or individuals. The simulation tracks who opened the emails and clicked on links within them.

See more details...


Pricing shown below is per seat/employee and requires an annual renewal.

This product is non-refundable and is not eligible for discounts.

SKU: D5007
Free shipping
  • *
PRICE BREAKS - The more you buy, the more you save
Quantity
1+
11+
51+
151+
Price
$40.00
$32.00
$29.00
$22.00
$40.00
decrease increase

The email address provided at checkout will be used to set up your account with Clear Law Institute.  You should receive an email with login information within one business day after receiving your confirmation email.

Among the many benefits of simulations, a well trained staff will:

  

  • Reduce the risk of falling prey to phishing scams.
    • Facebook and Google were the victims of an extended phishing scam that cost them over $100 million. Scammers sent the tech giants fake invoices that they paid for years. Training your staff on how to spot these types of phishing emails is the first step to prevent falling prey to scams.
  • Reduce the risk of dangerous malware delivery through phishing emails.
    • Phishing is an attack vector for ransomware. Phishing emails can contain dangerous links that allow malware to take control of your system and encrypt your data. Hackers then hold your data hostage until a ransom is paid. Maersk, a shipping company responsible for one-fifth of the world’s freight, had to stop operations when they fell victim to the “Not Petya” ransomware attack that cost their company over $200 million. A well-trained staff that can spot phishing attempts will cut off one of the most common channels for ransomware attack.
  • Assist in complying with cybersecurity legal requirements.
    • Equifax settled with the FTC for over $425 million when the company’s cyber-security standards were found insufficient, which led to a data breach. Training your staff on how to prevent and report a phishing attack helps to ensure compliance with adequate cybersecurity standards.

Each course:

  • Can be accessed anywhere, anytime on a computer, tablet, or smartphone
Among the many benefits of simulations, a well trained staff will:

  

  • Reduce the risk of falling prey to phishing scams.
    • Facebook and Google were the victims of an extended phishing scam that cost them over $100 million. Scammers sent the tech giants fake invoices that they paid for years. Training your staff on how to spot these types of phishing emails is the first step to prevent falling prey to scams.
  • Reduce the risk of dangerous malware delivery through phishing emails.
    • Phishing is an attack vector for ransomware. Phishing emails can contain dangerous links that allow malware to take control of your system and encrypt your data. Hackers then hold your data hostage until a ransom is paid. Maersk, a shipping company responsible for one-fifth of the world’s freight, had to stop operations when they fell victim to the “Not Petya” ransomware attack that cost their company over $200 million. A well-trained staff that can spot phishing attempts will cut off one of the most common channels for ransomware attack.
  • Assist in complying with cybersecurity legal requirements.
    • Equifax settled with the FTC for over $425 million when the company’s cyber-security standards were found insufficient, which led to a data breach. Training your staff on how to prevent and report a phishing attack helps to ensure compliance with adequate cybersecurity standards.

Each course:

  • Can be accessed anywhere, anytime on a computer, tablet, or smartphone
Product tags

Filters
Sort
display