Nimblr’s simulated attacks are an important part of the training programme and are based on thousands of actual threats that have been analysed, processed and disarmed by Nimblr’s experts.
Realistic, customer-specific simulations
To make the simulations more realistic, they are customised using customer-specific data entered by the administrator such as the name of the business’s CFO, the customer’s own logo or information on what office software is used in the business.
The library of simulated attacks is continually updated based on the latest trends among cybercriminals. Nimblr’s intelligent algorithm prioritises and distributes the simulations with user-specific schedules. The simulated attacks are selected on the basis of the user’s history. Users who have previously been shown to find it difficult to identify fake senders receive more simulations of that type, whereas other users, such as those who find it difficult not to click on offers for gift cards and rewards, will receive more simulations from that category. The difficulty level gradually increases once the user has learned to identify and avoid a certain type of attack.
Nimblr Instant Learning
Each simulated attack is linked to a tailor-made reminder for users who allow themselves to be tricked into clicking on the link or opening the attachment in a simulated attack. The reminder is called Nimblr Instant Learning and displays the message that fooled the user, along with interactive tips on what he or she can do differently next time. Along with the specific tips, the user is also invited to start a voluntary basic training module linked to the simulation in question.
Monitoring current phishing trends
The simulated attacks are generated and sent automatically to all active users in the Nimblr Security Awareness Programme. Two simulations per user per month are normally sent, but the frequency can be adjusted as required. Nimblr monitors current phishing trends and ongoing attacks in order to quickly create new simulations and train the users before they are exposed to the real attacks.
Examples of simulated attacks
The simulated attacks form an important part of Nimblr Security Awareness and consist of both customised and generic simulations of phishing, fraud, malware and many other types of IT-related threats.
Microsoft Office 365
Simulated phishing that claims that the user needs to sign in to Microsoft Office 365 and verify their inbox. In real life, attacks of this type are used to get hold of the user’s log-in details.
From the user’s own organisation
A simulated attack pretending to come from someone in the user’s own organisation. The data is taken from the business’ Nimblr configuration. In reality, these types of attacks have been used for purposes such as infecting businesses with ransomware.
A simulated attack that claims that someone has mentioned the recipient on Facebook. In real life, attacks of this kind are used to access log-in details to Facebook or to spread malware.