
PHISH
Send simulated phishing emails to your users, customise them too if you like
CybSafe PHISH and where to start.All you need to know about CybSafe's simulated phishing feature
Technical setup
All the information to technically prepare for PHISH deployment within your infrasturcture
Reference guide: Details to allowlist PHISHDetails required to allow list PHISH
How to Guide: PHISH allowlisting for MicrosoftA how to guide for allow listing PHISH for Microsoft
Phishing simulations messages are going to the junk folder of my users (MS365)Phishing simulations messages are going to the junk folder of my users
How to: Configure Exchange connector for phishing deliveryHow to add an Exchange connector for phishing delivery
How to guide: PHISH allowlisting for GoogleA how to guide for allow listing PHISH for Google technology stacks
Report phishing integration with CybSafeConfigure your email system to send successful reports of simulated phishing emails back to CybSafe
Report phishing button integration - MicrosoftUse these instructions to ensure your users can report any CybSafe phishing simulation emails.
How to install the CybSafe Google Workspace app and use Gmail phishing reportingInstall the CybSafe Workspace app and have report phishing data from Gmail come through to CybSafe
Running phishing simulations
Everything you need to know to successfully run your phishing simulation campaign
Phishing campaign creation and managementCreate, test and manage your phishing campaigns with this article
PHISH schedulerThis guide explains how the PHISH scheduler works to deliver simulated phishing campaigns.
Explainer: Creating custom phishing templatesYour how-to guide for creating custom phishing templates including use of our AI-powered phishing simulation templates
Phishing landing pagesWhat you need to know about our phishing landing pages and how to create a custom page with PHISH
Phishing Intervention pageWhat are intervention pages and how to create a custom intervention page with PHISH
PHISH explained
Need more information on how our scheduler works or how difficult our simulations are, take a look here.
Phishing difficulty explainedUnderstand CybSafe's phishing difficulty scale and how it works
Explainer: How PHISH tracks opens & clicksUnderstand how to we track CybSafe phishing emails
Tutorial: Phishing UAT testingFollow these steps to ensure you have configured everything ready for a Phishing simulation
Tutorial: The CybSafe way to PHISHOur recommended approach to running your phishing simulations
Reference guide: Triage PHISH emailsUnderstand how to triage phishing emails
Reference guide: QR phishing
Explainer: Multi-language support for the phishing email editor
Explainer: Videos for PHISH featuresExplainer videos for PHISH features
