Security Awareness

Setting up phishing campaigns yourself has never been easier with Guardey!

Information Security
Privacy
Security Awareness

Heading 1

Heading 2

Heading 3

Heading 4

Heading 5
Heading 6

Lorem ipsum by sit amet, consectetur adipiscing elit, sed do eusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Dis aute irure door in reprehenderit in voluptate velit se cillum dolore eu fugiat nulla pariatur.

Block quote

Ordered list

  1. Item 1
  2. Item 2
  3. Item 3

Unordered list

  • Item A
  • Item B
  • Item C

Text link

Bold text

Emphasis

Superscript

Subscript

Every week, users within Guardey receive a challenge to test their knowledge and compete with colleagues on a company-wide leaderboard. Topics such as malware, password protection, and even deepfakes all come up. But of course, phishing is a big focus. And what better way to test that knowledge than with a realistic phishing simulation?

Heading 1

Heading 2

Heading 3

Heading 4

Heading 5
Heading 6

Lorem ipsum by sit amet, consectetur adipiscing elit, sed do eusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Dis aute irure door in reprehenderit in voluptate velit se cillum dolore eu fugiat nulla pariatur.

Block quote

Ordered list

  1. Item 1
  2. Item 2
  3. Item 3

Unordered list

  • Item A
  • Item B
  • Item C

Text link

Bold text

Emphasis

Superscript

Subscript

This article was last updated on
24.03.2026
Written by
Ruben
Renter
Marketing Specialist

New Guardey module: phishing simulations

With the latest module from Guardey you can now easily set up (spear) phishing simulations yourself! This gives you the opportunity to measure how well your team scores in cybersecurity. Start with a basic measurement and then test periodically to measure the effect of your training sessions. The process is simple: choose a template, personalize, set time and target groups, and you're up and running in minutes. And last but not least: it is also a way to comply with the security awareness component of, for example, the ISO 27001 and the NO 7510.


👉 Read the difference between phishing and spear phishing.

Set up your phishing simulation in 7 steps

Setting up a phishing simulation in Guardey has never been easier. You're done in 7 steps, it works like this:

1. First, go to your admin panel and create a new phishing campaign.

2. Next, choose a campaign template from our library. You can personalize each template.

3. Give your phishing campaign an appropriate name.

4. Select the web domain from which to send your phishing campaign.

5. Now set a time and date for phishing emails to be sent to your users.

6. Determine whether this phishing campaign should be sent to everyone in your organization, certain groups, or specific individuals.

7. Then check the details and you're ready to go. It's that simple! Within a few minutes, you can put a phishing campaign live.

Measuring & Monitoring

Once the phishing emails have been sent, you can monitor the results immediately. In one overview, you can see how many emails were sent, opened, how many links were clicked, and how many users entered their data. You can even gain insight at an individual level. Start with a baseline measurement and then test regularly to see if your team's awareness grows.

As a Service or Get Started Yourself

Would you rather have us in control? Our Spear Phishing Simulation service, where we set up fully personalized campaigns for you, will of course remain available. But with this new tool, you can easily get started yourself.

Wondering how this can help your organization? Schedule a free introduction and let's discuss the possibilities together!

Heading 1

Heading 2

Heading 3

Heading 4

Heading 5
Heading 6

Lorem ipsum by sit amet, consectetur adipiscing elit, sed do eusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Dis aute irure door in reprehenderit in voluptate velit se cillum dolore eu fugiat nulla pariatur.

Block quote

Ordered list

  1. Item 1
  2. Item 2
  3. Item 3

Unordered list

  • Item A
  • Item B
  • Item C

Text link

Bold text

Emphasis

Superscript

Subscript

How many people participate?

Request now

Thanks!
Oops! The form could not be submitted. Please try again.

More resources

News

Dag stoffige consultancy, hallo Next-Gen C!

thru
Ruben
Blog
Partners

Our Trusted MSPs

thru
Jurre
Blog
Implementation

What documents do you need for ISO 27001 proof?

thru
Mathijs
Kennisartikel