Skip to Main Content
Steer your organisation safely through 2021 and navigate to cyber safety with IT Governance. Find out how
Coronavirus Phishing Attack Simulation

Coronavirus Phishing Attack Simulation

SKU: 5542
Authors: ITG
Format: Remote penetration test
Availability: Available
  • Test how your staff respond to coronavirus-based phishing attacks with a simulated and controlled attack.
  • Targets IT users of your choice.
  • Carefully designed and non-destructive.
  • Identifies in detail how vulnerable your organisation is to phishing attacks.
For more information about this service or to get a tailored quote for your organisation, please enquire below and one of our experts will be in touch shortly.Enquire about this service

Test how your staff respond to coronavirus-based phishing attacks

This simulated attack will enable you to see how vulnerable your organisation is to phishing attacks – particularly those related to coronavirus – and will include a detailed report on how to address the issues found.

This controlled attack includes:

  • A consultation to determine the extent of the phishing simulation;
  • A scoping plan to target IT users of your choice, whether based at home or in the office;
  • The simulated phishing attack; and
  • A report including full analysis of your vulnerabilities.

  See the full service description here.

Coronavirus and phishing

Phishing attacks are quick and easy to implement and deliver an enormous return on investment, which motivate criminals to craft increasingly sophisticated and creative phishing ‘lures’. Malicious attackers are now sending phishing emails and creating fake sites that play on fears related to coronavirus (COVID-19). IT Governance’s testing service offers the chance to assess how your staff respond to these attacks.

This will be carried out in a controlled manner so it does not affect your business in these troubling times. The test will be delivered remotely and can be applied to both staff in the office and those working remotely.

The service applies to organisations with up to 250 staff. It can be delivered to organisations in any sector or industry.

COVID-19: remote delivery options

We would like to reassure our clients that all training and consultancy services will go ahead as scheduled during the current COVID-19 situation. As a company that fully embraces flexible and remote working, we are adjusting our delivery methods to allow us to provide consultancy services, penetration tests and training remotely where necessary. Please also refer to our COVID-19 policy.

Require a level 2 penetration test?

We’ve designed our standard packages to be easy and affordable, but if you are unsure of your requirements, or your needs are more complex and involve attempting to exploit the identified vulnerabilities, please call us to discuss. Our consultants can answer your questions and make the process painless. If you would like to talk to one of our testers or meet with them, we would be happy to arrange this for you.

Contact us


Coronavirus phishing attack simulation pricing

  • 1 simulation: £2,400

Service conditions

  • The service applies to organisations with up to 250 staff. It can be delivered to organisations in any sector or industry.
  • Consultant expenses related to travelling, etc. are not included in the price.
  • On-site presentation of report findings and remedial consultations can be provided upon request at an additional cost.
Why IT Governance?

Why choose us?

  • Simulated phishing attacks should only be carried out by experienced consultants with the necessary technical skill set and qualifications. Our consultants have strong technical knowledge and a proven track record in finding security vulnerabilities. They can carry out exploits in a safe manner and advise on appropriate mitigation measures to ensure that your systems are secure.
  • Our CREST-certified testing team will provide you with clarity, technical expertise and peace of mind knowing that your employees’ susceptibility to phishing lures has been assessed by experienced social engineering penetration testers in line with your business requirements.
  • For Azure clients, our penetration tests comply with the Microsoft Rules of Engagement . This means we take care to limit all penetration tests to your assets, thereby avoiding unintended consequences to your customers or your infrastructure.

Customer Reviews

This website uses cookies. View our cookie policy
WIN £100