Setting Up a Phishing Campaign is uncomplicated and fast! It’s the perfect way to test your team and identify additional training opportunities by sending them realistic fake phishing emails in an attempt to deceive them into clicking links to give up their credentials.
1. Click on Phishing on the left side menu, then choose Create Campaign:
2. You may either use Smart Phishing with preset templates
3. Or disable it and pick your own templates out of 50+ existing
4. Click on Recipients tab and select if the users you want to assign the campaign to
5. Click on Delivery Tab and select the Frequency, Start Date, Delivery Period, range of times and Time zone. You may check how many users will be phished per day by placing the cursor at the date circled in blue. Once you are all set hit Preview and Start tab in the upper right corner
6. Please pay attention to manuals to whitelist our IPs in Office 365 and GSuite. You may double-check the selected options before you click Start Campaign
7. You will receive a notification Phishing Campaign Successfully Started and will be forwarded to a result page where you may track a percentage of Emails Sent, Opened, Clicked and Phished marked in Blue, Green, Orange, and Red accordingly. You may download Results and Stop Campaign by clicking Actions tab
Frequently Asked Questions About Phishing Campaigns
1. Can I run a Phishing Campaign with my users before I start Wizer Training? Of course! Contact email@example.com to discuss and set up our Custom option. You will be able to add your users to the campaign without sending them an email invite.
2. Why should I run a Phishing Campaign? Testing your employees this way will help you gauge your risk and response rate as well as identify training opportunities for those who may need it.
3. Do users receive a notification when I start a Phishing Campaign? No, Users only receive an invitation once they got a Training or Phishing Game assigned
4. Why do we recommend setting Entire Period as Delivery period in Phishing campaign? To avoid spreading the news amongst colleagues they have been targeted to be phished.