TraceSecurity's Phishing Simulator - On-demand Social Engineering Testing

Phishing Simulator
Login Email
Forgot Password    


TraceSecurity's new Phishing Simulator is an on-demand tool for mimicking an authentic phishing attack without exposing the employee or network to any real risk.

How It Works

The innovative Phishing Simulator enables companies of any size or complexity to easily evaluate the overall security awareness culture within their organization.

With our simple 3 step process, it only takes minutes to set up and deploy a simulatedphishing attack...without ever writing a line of code!

Step #1: Enter Email Addresses
Click the "Add Email Address" button to enter the email addresses of employees to be tested.

Step #2: Deploy the Attack
Click the checkbox next to the email address of the employees you wish to be sent the social engineering attack, then click the SEND button at the bottom of the screen.

Step #3: View the results
The dashboard displays the results of each recipients' actions, giving you a clear view of which employees pass and which fail.

If the employee clicked the link within the message you will see the date of the action in the CLICKED field, indicating that users computer could have been compromised if the message was actually a harmful phishing email.

You will also see the date of the action in the INSTALLED field if an attempt was made to install the software. This indicates that the user would have manually installed malicious software on their computer, thus putting the entire network at risk.

If either field has a datestamp, the user failed the test.  This indicates that if this had been a real-world phishing attack, the user would have put your network at risk and potentially exposed the company to undue threats. However, if the CLICKED or INSTALLED field displays [EMPTY], the user passes the test.

The Phishing Simulator enables your company to:

  • Evaluate the effectiveness of the organization's information security policies
  • Determine how well employees adhere to internal security procedures
  • Assess the level of security awareness that exists among employees
  • Identify areas of weaknesses in order to form a remediation plan


Free Trial

Why should companies perform social engineering tests?

Some of the most dangerous threats to information security can come from your own employees. Technological controls do little to prevent employees from being tricked into opening a well-crafted phishing email. These malicious messages - usually disguised as legitimate communication from a seemingly trustworthy source - often contain malware that, if activated, could easily infect your entire network with keyloggers, viruses, back-end trojans or other harmful code.

Deploying a simulated phishing attack against groups of employees not only tests their willingness to click on an unsolicited email, but also determines if they are disposed to downloading potentially harmful code onto the local workstations.

Companies of all sizes and complexities use Phishing Simulator to evaluate the overall security awareness culture within their organization, as well as to determine which aspects of security training require additional attention.

Free Trial

Getting Started With the Phishing Simulator

By using the new Phishing Simulator as a self-assessment tool, companies can now conduct their own social engineering tests in a completely safe and secure environment. Our 3 step process will allow you to perform the social engineering attack within minutes after creating an account and generate a detailed, yet easy-to-read report of all the results.

Using the Phishing Simulator is a simple 3 Step Process:

  • Enter Email Addresses
  • Deploy the Attack
  • View and Analyze the Results

There's no complicated contract required, no code for you to write, and no actual threat to your employees or network environment.

Free Trial


Security Awareness Resources
Security Awareness Resources
Request a Free Trial
Free Trial
3 Step Process

Terms and Conditions       Privacy Policy       Contact Us
© Copyright 2013 TraceSecurity Inc. All Rights Reserved