Phished explained

Find out how our AI-driven phishing simulations train every recipient based on his personal knowledge level.

Automated Phishing Simulations

Our comprehensive platform sends fully automated phishing simulations throughout the year, without the need for user intervention. No need to think about what kind of phishing attacks there are and how your organization can best educate and prepare its employees for each type.

Or check out our pricing page →


Create an account

Start the journey by creating a free account. You’ll be guided through the configuration phase by an easy-to-use wizard that helps us get to know you and better understand your organization. 


Upload recipients

Once the initial set-up is done, the real work begins: uploading recipients. This can be done manually, via mass file upload or through an API. You can decide whether or not to notify recipients about their admission to the program.



Excellent, we’re done! The platform will start sending out simulations within 24 hours to each recipient. Based on their responses, the types and send times of simulations are adapted for everyone by the smart algorithms.
You can read more about how it works for recipients here.

Automated simulations

Advanced phishing simulations that are personalised for every recipient.

Manual simulations

Create your own simulations using an advanced but easy-to-use editor.

Unique Templates

A comprehensive library of over 5.000 unique phishing templates that is regularly updated.

Spear phishing

Spear phishing, CEO fraud, NSFW, industry related, job related,… even smishing!

Advanced reporting

Keep an eye on the status of individual recipients and your organisation as a whole.

3 Languages

Automated simulations can be delivered in 3 languages: Dutch, English and French.

What does Phished look like?

Take a closer look at the most popular pages.

    Recipient's week

    The program’s objective is to make phishing experts out of everyone, and this page allows you to track how this is going on an individual basis.

    Ready to start using these functionalities?

    List with uploaded users

    Overview of all the recipients that where uploaded by the administrator. The number of recipients depends on your contract. Create as many administrators as there are recipients.

    Import several users at once by using our bulk upload tool (XLSX or CSV format) or by using our API.


    The start screen is specifically created so you immediately get an overview of all the most important metrics. 

     External validation and certifications

    In addition to our extensive internal scanning and testing programs, we implement best practices to maintain full compliance and memberships.

    SOC certification

    Application servers and data are stored at google datacenters, which are, among others, SOC 1, SOC 2 and SOC 3 certified.

    ISO 27001-compliant facilities

    Application servers and data are stored at google datacenters, which are, among others, ISO 27001, ISO 27017.

    SHA256 encryption

    All personal data is stored in SHA256 encrypted databases with rotating keys and is inaccessible to non-authorised personnel.

    3rd party penetration test

    Security testing is done on a continuous basis with the help of certified ethical hackers.


    We Serve a Variety of Businesses & Industries

    Phishing awareness programs can be used in every sector and every company. It complies with all sector-specific regulations. Cybersecurity awareness is necessary for every company, large or small.

    Or check out our pricing page →


    Higher Education

    Critical Infrastructure

    Legal & Professional Services

    Energy / Utilities

    Health Care



    Contact us

    +32 (0)53/31.97.55

    3000 Leuven, Belgium

    Protect your organisation

    Try out our platform for 14 days without any obligation!