February 11, 2021

Why Mock Phishing And Training Is Important

Testing the company's staff on their ability to spot phishing attacks should be a routine process that all businesses should adhere-to. The importance of knowing which members of the team require some level of training is crucial.

Testing the company's staff on their ability to spot phishing attacks should be a routine process that all businesses should adhere-to. The importance of knowing which members of the team require some level of training is crucial.

What is a mock phishing simulated attack?


Using technology that mimics generic and tailored phishing emails, the target company is sent harmless emails with tracking technology that reports back who opened the emails and clicked on the links within them. The simulated phishing emails can mimic anything from Amazon order confirmations to IRS warnings. They can also be spear-phishing emails tailored to attack a specific entity, company, department, or persons.

What to expect when you engage a managed IT services provider for mock phishing training campaigns?

We can't speak for all MSP's, but with iTecs, we start the process by interviewing the manager who will be our main point of contact and decide on the level of aggression, the types of simulated attacks, the attack schedule, and if and how we enforce training. iTecs handles the design, launch, tracking, reporting, and training; we handle everything.


Important things to consider:

  • What type of attacks, generic phishing, spear-phishing, and information gathering campaigns would be desired?
  • The schedule and time between the scheduled attacks to train staff who fail the first wave of simulated phishing emails are essential to design.
  • Is training mandatory with those that are reported as "clickers"?


The mock phishing campaign design can be intricate, but iTecs has much experience working with various companies and can make suggestions as consultants. This is what differentiates us from other competitors.  We provide our clients with the white-glove managed experience and work closely with them to ensure we meet their goals.


We've started our campaigns with an online seminar, hosted for your staff, that provides a short but very informative session to teach how to spot phishing attacks followed by a quick Q&A session. The seminar is recorded and delivered to the customer to use with future onboards of new employees. This is an optional way to begin, the seminar could always be something we perform once the first waves of attacks has been launched.


If you are interested in learning more about iTecs mock phishing simulations and training services, please let us know, and an IT specialist will be happy to assist.

Latest Posts

September 8, 2021

How To Protect Crypto Exchange Accounts

Mitigate the chances that your crypto exchange accounts get hacked by following the tips below.‍You may have read articles of families losing their entire online Exchange accounts balances due to hackers breaching and stealing everything they own. Some of you may believe that the responsibility of these hacks is on the Exchanges, and I'm here to tell you this is usually not the case. Before you get angry, let me first explain the two types of hacks that occur that lead to you losing your entire investment.

Read More
July 16, 2021

Why End Point Detection (EDR) Offers Better Security

The rate at which new threats are being identified proves the inadequacy of traditional anti-virus software as a singular security measure. Considering its powerful and comprehensive threat-detecting abilities, SentinelOne proves to be a clear winner in any environment.

Read More
July 12, 2021

What is a Crypto Wallet and How to Secure it

There are various types of cryptocurrency wallets. The three prominent are offline, online, and those held by a custodian. Before we explain the differences between the three, it's important to note that a custodian, in this context, is an entity that holds your private key. Next, we'll go into what a private key is but first, let's dive deeper into the three types.‍

Read More

You have questions, we have answers

What can we help you with?