Englisch

Security Awarenss Library

Successfully fend off cyber gangsters - with the IT security e-learning library of  Deutschen Telekom Security and mybreev

Learn more - - >

Borussia E-Learning Portal

Borussia Mönchengladbach uses the entire Security Island E-Learning Library for the digital training of their employees. 

Learn more- - >

CLIENTS
ARAG
Allianz
ASFINAG
Axel Springer
Barmenia
Borussia Mönchengladbach
BSH
Bürkert Fluid Control Systems
Coca-Cola
Covestro
Daimler
Danone
Deutscher Fußballbund e. V.
DFL Deutsche Fußball Liga
Douglas
ESG Elektroniksysteme- und Logistik
Getty Images Deutschland
Hansgrohe
HELM
Henkel
Hörmann
INTERNATIONAL SOS
KfW Bankengruppe
KPMG
Logwin
MAN
N26
Rohde & Schwarz
Rolls-Royce
Schülke & Mayr
Serviceplan Group
Telekom
Teva
Wanzl
Zalando
Zurich Insurance Company
Get Product Demo Get product pdf
Dashboard Configuration for operation 
Highscore-List Compete against each other 
Content Updates Content on the pulse of time 
Customizing Customizable to your organization 
What "Phished Again!" is about
  • Simulation of deceptively real phishing mails in a playful learning environment
  • Users decide for themselves how to deal with individual mails
  • Helpful and entertaining comments on every single decision
  • Safe, entertaining trial and error instead of anxious restraint
  • More info

FAQ

How does "Phished Again!" differ from simulated phishing attacks in a real learning environment?

Although there are already some simulations that address the topic of "defense against phishing attacks", these solutions have a clear weakness. The simulated attacks are sent directly to the employees' mail accounts, which can lead to uncertainty among employees. Companies report that after being confronted with such simulated phishing mails, employees hardly dared to open further mails or their attachments. That's why "Phished Again!" relies on a completely autonomous, virtual desktop environment that takes away all fears of contact from the user.

How does the game work from the user's perspective?

Within a simulated desktop environment, the player opens different incoming e-mails and examines them for different phishing characteristics. Suspicious elements of such a mail can be marked by the users. At the end of each round, the player receives a resolution and a comment on his actions. Through this direct feedback the user learns more and more about phishing mails and how they work.

Can the game be customized?

The game can be adapted to your corporate design as well as the content of individual phishing mails. So you can have the kind of phishing mails that could be dangerous for your company integrated into the game?