This section focuses on the Vishing simulation, part of the Phishy Simulation Module, which trains employees on recognizing and responding to voice-based phishing threats.

Introduction

The Phishy Simulation Module is designed to help organizations test and enhance their employees’ responses to various types of phishing attacks. Vishing, or voice phishing, involves deceptive phone calls to extract sensitive information from the recipients.

Vishing Simulation

Vishing is an essential part of our simulation training that involves:

  • Realistic Call Scenarios: Employees receive calls that mimic real vishing attempts to provide hands-on experience.
  • Customized Threats: Each simulation can be tailored to reflect the specific threats that an organization might face.
  • Immediate Feedback: Participants receive immediate feedback on their actions to help them learn from their mistakes and improve their awareness.

Getting Started with Vishing Campaigns

To create an effective Vishing campaign, follow these steps:

  1. Campaign Setup: Define the name, objectives, and scope of your vishing simulation campaign.
  2. Template Selection: Choose a call script template that mimics the vishing styles your organization is likely to encounter.
  3. Target Group Selection: Identify the employee groups who will participate in the simulation.
  4. Call Settings Configuration: Set up the phone number and time settings for the calls that will be made during the simulation.

Refer to the following resources for detailed information about setting up and running Vishing simulations:

Campaign Setup

Learn how to set up your Vishing campaign

Template Selection

Choose and configure call templates

Target Group Selection

Select target groups for the simulation

Call Settings

Configure call settings for Vishing

Regular training and awareness are crucial in defending against vishing attacks. Ensure your team is prepared by conducting regular simulations.