1352_GAMO_POI9-foto-14 copy

Phishing without risk? Simulated attacks as diagnostics of company resilience

Cybersecurity is human-dependent. Although companies are increasingly investing in technology solutions, the human factor remains one of the most common causes of successful cyber-attacks.

Phishing, i.e. fraudulent email masquerading as trustworthy communication, is still one of the most effective tools of attackers. It is relatively easy for them to obtain access credentials, sensitive information, or launch malicious processes on the network.

Phishing campaigns are extremely persuasive today. They are no longer about “inheritance from a prince”. Attackers precisely mimic the visuals and language of real companies, greatly increasing the chances of success. One careless click and the consequences can be fatal.

We surveyed the readiness of companies

Before the launch of the new service of simulated phishing campaigns, we conducted a survey among customers. We were interested in their experience with phishing and what forms of protection they would appreciate. The results confirmed that this is an extremely hot topic: 74% of respondents said they experience phishing very often or occasionally. The most useful services were:

  • 36% detection of suspicious emails and links
  • 34% simulated phishing campaigns
  • 30 % regular staff training

The high response reinforced our decision to include this service in our portfolio. We even drew one of the survey participants and he will receive a complete customized simulation, from preparation to evaluation.

Simulation without consequences, results with impact

Simulated phishing campaigns are a safe way to test employee preparedness for attacks in practice, without any risk to the company’s infrastructure.

According to statistics, an average of 30 to 40 percent of users open a fraudulent email before completing training. However, regular mock campaigns and adherence to recommendations can increase employees’ ability to spot phishing emails by up to 80 percent over the course of a year.

The aim of the simulations is not to “catch” employees, but to get an objective picture of the company’s vulnerabilities and identify teams at higher risk of failure.

An ethical hacker’s observation

“I know from experience that using freely available tools and a minimal investment of time and money it is possible to compromise a company through its employees. All the security measures such as WAF, IDS, IPS or MFA will do nothing to prevent this. In the end, even in this era full of artificial intelligence and technological advances, everything stands and falls on humans.”

The service takes place in several key steps:

  • We prepare realistic phishing emails based on real attacks. We focus on design, language and behavioural elements.
  • We send them to selected groups of users of the tested organization or company to get representative data.
  • We track open rates, clicks, and other responses.
  • The results are then visualized and evaluated, along with specific suggestions for improving both awareness and security processes of the tested party.

By repeating campaigns at regular intervals, we achieve a long-term effect. Employees develop the habit of critically evaluating every email they receive. In addition, comparing results over time allows companies to track real improvements and the effectiveness of the actions taken.

More than technology, it’s about behaviour

Even when companies deploy modern technologies such as firewalls, EDR solutions, segmentation and backup, the end result still depends on the daily behaviour of users. This is because phishing campaigns do not attack technical vulnerabilities, but use psychological tricks. This is why they are often successful. They can fool even technologically well-protected organisations.

The advantage of simulated phishing attacks is their high predictive value for both management and the IT department. The company doesn’t just get a general picture of the risk, but specific data: which teams are most vulnerable, how quickly users reported suspicious emails, where internal communications are failing.

Prevention is cheaper than dealing with the consequences

Our service is suitable for companies of all sizes and sectors. It helps to identify vulnerabilities while raising security awareness throughout the organisation. Simulated phishing campaigns promote a corporate culture of vigilance and accountability, which in practice is the most effective form of protection against real-world attacks.

Because there is an unwritten rule in cybersecurity: The best attack is the one that never happens.

Published: 24. June 2025

Diana Filadelfi

Obchod

GAMO a.s.

This article is part of magazine no.

Published: 24. June 2025

advertising

Peter Blažečka

ESET, spol. s r.o.

Sometimes it happens that attackers manage to deploy ransomware on a company network despite strong security. But even then, sensitive...

Martina Kormaník

GAMO a.s.

The amendment to the Cybersecurity Act transposing the NIS 2 Directive has also brought new obligations for food processing and...

Zuzana Holý Omelková

GAMO a.s.

If organisations want to avoid mistakes, it is essential to take a systematic and responsible approach to the implementation of...
advertising