{"id":641,"date":"2025-09-28T00:24:20","date_gmt":"2025-09-28T00:24:20","guid":{"rendered":"https:\/\/dev.networks.engineering\/?page_id=641"},"modified":"2025-10-12T18:35:33","modified_gmt":"2025-10-12T18:35:33","slug":"email-phishing-testing","status":"publish","type":"page","link":"https:\/\/ee.networks.engineering\/index.php\/email-phishing-testing\/","title":{"rendered":"Email Phishing Testing"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"641\" class=\"elementor elementor-641\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-057f006 e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"057f006\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;animation&quot;:&quot;zoomIn&quot;,&quot;motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e0ed6db elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"e0ed6db\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">Email Phishing<br>\nTesting Services<\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-16249fe elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"16249fe\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"main-section\"><div class=\"container-main-1160\"><section class=\"c-full-bleed-title module-68e8104c2676f\"><div class=\"o-container\"><div class=\"c-full-bleed-title__copy\"><section class=\"c-full-bleed-title module-68e89428bff46\"><div class=\"o-container\"><div class=\"c-full-bleed-title__copy\"><section class=\"c-full-bleed-title module-68e8bdc68f812\"><div class=\"o-container\"><div class=\"c-full-bleed-title__copy\"><p><strong>Spam, phishing and advanced social engineering attacks represent a huge threat to organisations.<\/strong><\/p><\/div><\/div><\/section><\/div><\/div><\/section><\/div><\/div><\/section><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ab18371 e-flex e-con-boxed e-con e-parent\" data-id=\"ab18371\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-fe2bcb8 e-con-full e-flex e-con e-child\" data-id=\"fe2bcb8\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-1281ce4 e-con-full e-flex e-con e-child\" data-id=\"1281ce4\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-49a1711 elementor-widget elementor-widget-heading\" data-id=\"49a1711\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Phishing Testing: Train Users, Protect Your Organisation\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ffe2d94 elementor-widget elementor-widget-text-editor\" data-id=\"ffe2d94\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Work with Networks to improve your user security awareness and reduce the risk of a cyber security event in your organisation.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4b9fa3f elementor-widget elementor-widget-text-editor\" data-id=\"4b9fa3f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Our expert cyber security consultants can test your users\u2019 awareness with a bespoke campaign. Either covering your whole organisation or areas considered high risk, we\u2019ll determine security awareness and provide post-event cyber security training.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a38bec9 elementor-widget elementor-widget-text-editor\" data-id=\"a38bec9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"c-text-image c-text-image--img-right c-text-image--non-full-bleed module-68e8bdc68ff12\"><div class=\"o-container c-text-image__container\"><div class=\"c-text-image__copy-holder\"><div><p><strong>Discover more about our email phishing testing services:\u00a0\u00a0<\/strong><\/p><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-022521b e-con-full e-flex e-con e-child\" data-id=\"022521b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f044dae elementor-widget elementor-widget-image\" data-id=\"f044dae\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"667\" src=\"https:\/\/ee.networks.engineering\/wp-content\/uploads\/2025\/10\/0x0-scaled.jpg\" class=\"attachment-large size-large wp-image-1505\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ab3c3df e-flex e-con-boxed e-con e-parent\" data-id=\"ab3c3df\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-df4b9b8 e-con-full e-flex e-con e-child\" data-id=\"df4b9b8\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-1ff078d e-con-full e-transform e-flex e-con e-child\" data-id=\"1ff078d\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_transform_scale_effect&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-257d87c elementor-widget elementor-widget-heading\" data-id=\"257d87c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Test Your Organisation's Security Awarenes\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3f96660 elementor-widget elementor-widget-text-editor\" data-id=\"3f96660\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Enquire about our email phishing testing services for your organisation today:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1bcd8e0 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"1bcd8e0\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/ee.networks.engineering\/index.php\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-246931e e-con-full e-flex e-con e-parent\" data-id=\"246931e\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-64458b1 e-con-full e-flex e-con e-child\" data-id=\"64458b1\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fe280d7 elementor-widget__width-inherit elementor-widget elementor-widget-image\" data-id=\"fe280d7\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1500\" height=\"1000\" src=\"https:\/\/ee.networks.engineering\/wp-content\/uploads\/2025\/10\/photo_2025-10-10_11-38-48.jpg\" class=\"attachment-full size-full wp-image-1552\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-13ffed1 e-con-full e-flex e-con e-child\" data-id=\"13ffed1\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-81f07ad e-con-full e-flex e-con e-child\" data-id=\"81f07ad\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c2c320a elementor-widget elementor-widget-heading\" data-id=\"c2c320a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What Is Phishing Testing?\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b0bc79e elementor-widget elementor-widget-text-editor\" data-id=\"b0bc79e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Networks phishing testing offers a simulation of a phishing attack, allowing you to test how security conscious your users are.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-58c9465 elementor-widget elementor-widget-text-editor\" data-id=\"58c9465\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Testing is run remotely so as not to arouse suspicion. Using one of over 500 specially designed email templates, we\u2019ll launch a simulated phishing email attack to your user base.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-853360d elementor-widget elementor-widget-text-editor\" data-id=\"853360d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"c-text-image c-text-image--img-left c-text-image--non-full-bleed module-68e6409d38a93\"><div class=\"o-container c-text-image__container\" data-wpr-lazyrender=\"1\"><div class=\"c-text-image__copy-holder\"><p>Networks then tracks where users have engaged with the email either by opening it or clicking links within the email.<\/p><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a853de elementor-widget elementor-widget-text-editor\" data-id=\"2a853de\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"c-text-image c-text-image--img-left c-text-image--non-full-bleed module-68e6409d38a93\"><div class=\"o-container c-text-image__container\" data-wpr-lazyrender=\"1\"><div class=\"c-text-image__copy-holder\"><p>After the simulation, we\u2019ll produce a report for management and stakeholders showing who in the organisation has failed the test. This may reveal trends or highlight particular departments most at risk<\/p><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c5ed4ad elementor-widget elementor-widget-text-editor\" data-id=\"c5ed4ad\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"c-text-image c-text-image--img-left c-text-image--non-full-bleed module-68e6409d38a93\"><div class=\"o-container c-text-image__container\" data-wpr-lazyrender=\"1\"><div class=\"c-text-image__copy-holder\"><section class=\"c-text-image c-text-image--img-left c-text-image--full-bleed module-68e8104c2d980\"><div class=\"o-container c-text-image__container\"><div class=\"c-text-image__copy-holder\"><p>As part of testing, users that have failed will be given access to an online training portal and required to pass a test within 30 days to show they now understand security risks.<\/p><\/div><\/div><\/section><\/div><\/div><\/section><section class=\"c-reviews module-68e6409d39300\"><div class=\"c-reviews__bg parallax-bg-image\">\u00a0<\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-722dfb8 e-flex e-con-boxed e-con e-parent\" data-id=\"722dfb8\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1bb2f85 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"1bb2f85\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why Undertake Regular Email Phishing Assessments?\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5623867 elementor-widget elementor-widget-text-editor\" data-id=\"5623867\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>In the realm of security, an organisation\u2019s users are often the weakest link when it comes to protecting against threats. This is because attackers frequently use social engineering techniques \u2013 such as phishing \u2013 to exploit user behaviour and gain unauthorized access to sensitive information.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-84f7e59 elementor-widget elementor-widget-text-editor\" data-id=\"84f7e59\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Recent studies have shown that\u00a0around 80% of cyber attacks experienced by Europe businesses\u00a0are phishing attempts. This underscores the need for organizations to be proactive in assessing their user base\u2019s vulnerability to such threats.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f0653b elementor-widget elementor-widget-text-editor\" data-id=\"0f0653b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"c-text-block module-68e47cdf1ea2f\"><div class=\"o-container c-text-block__container\"><div class=\"c-text-block module-68e6409d3869b\"><div class=\"o-container c-text-block__container\"><div class=\"c-text-block module-68e8104c287af\"><div class=\"o-container c-text-block__container\" data-wpr-lazyrender=\"1\"><div class=\"c-text-block module-68e8104c2ae3c\"><div class=\"o-container c-text-block__container\"><div class=\"c-text-block module-68e8104c2c016\"><div class=\"o-container c-text-block__container\"><p>One way to do this is by adopting phishing testing services. The testing is designed to assess the users\u2019 level of preparedness for a potential phishing attack and identify potential weak links in the organisation that may be vulnerable to email spoofing.<\/p><\/div><\/div><section class=\"module-68e8104c2c3f7\"><div class=\"c-cta-bar fade-in-up c-cta-bar--copy-white c-cta-bar--copy-center c-cta-bar--bg-blue\">\u00a0<\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ec5ef1d elementor-widget elementor-widget-text-editor\" data-id=\"ec5ef1d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"c-text-block module-68e47cdf1ea2f\"><div class=\"o-container c-text-block__container\"><div class=\"c-text-block module-68e6409d3869b\"><div class=\"o-container c-text-block__container\"><div class=\"c-text-block module-68e8104c287af\"><div class=\"o-container c-text-block__container\" data-wpr-lazyrender=\"1\"><div class=\"c-text-block module-68e8104c2ae3c\"><div class=\"o-container c-text-block__container\"><div class=\"c-text-block module-68e8104c2c016\"><div class=\"o-container c-text-block__container\"><div class=\"c-text-block module-68e8bdc6a8431\"><div class=\"o-container c-text-block__container\"><p>Our experts will conduct a phishing attack simulation, which will help to identify how users in the organization respond to potential phishing emails. They will then provide training and guidance on how to eliminate the risk of phishing attacks, including advice on how to identify and report suspicious emails.<\/p><\/div><\/div><\/div><\/div><section class=\"module-68e8104c2c3f7\"><div class=\"c-cta-bar fade-in-up c-cta-bar--copy-white c-cta-bar--copy-center c-cta-bar--bg-blue\">\u00a0<\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1dcf26a e-flex e-con-boxed e-con e-parent\" data-id=\"1dcf26a\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cf8e1ce elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"cf8e1ce\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Ongoing Email Phishing Testing Assessments\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c7d3902 elementor-widget elementor-widget-text-editor\" data-id=\"c7d3902\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Networks phishing testing services can be conducted as a one-off exercise. But Networks recommends periodic testing (typically quarterly) to ensure that an organisation\u2019s vigilance against phishing attacks remains high.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8fa6fb0 elementor-widget elementor-widget-text-editor\" data-id=\"8fa6fb0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>As part of the managed phishing test service, the testing can be customised to suit the needs of the organisation. This may involve testing the entire organisation, or tailored testing of select, high-risk departments or job functions (such as finance).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-81cc2f9 elementor-widget elementor-widget-text-editor\" data-id=\"81cc2f9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"c-text-block module-68e47cdf1ea2f\"><div class=\"o-container c-text-block__container\"><div class=\"c-text-block module-68e6409d3869b\"><div class=\"o-container c-text-block__container\"><div class=\"c-text-block module-68e8104c287af\"><div class=\"o-container c-text-block__container\" data-wpr-lazyrender=\"1\"><div class=\"c-text-block module-68e8104c2ae3c\"><div class=\"o-container c-text-block__container\"><div class=\"c-text-block module-68e8104c2c016\"><div class=\"o-container c-text-block__container\"><p>This flexibility ensures that the testing is relevant and meaningful to the specific needs of the organisation.<\/p><\/div><\/div><section class=\"module-68e8104c2c3f7\"><div class=\"c-cta-bar fade-in-up c-cta-bar--copy-white c-cta-bar--copy-center c-cta-bar--bg-blue\">\u00a0<\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bcffa76 elementor-widget elementor-widget-text-editor\" data-id=\"bcffa76\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"c-text-block module-68e47cdf1ea2f\"><div class=\"o-container c-text-block__container\"><div class=\"c-text-block module-68e6409d3869b\"><div class=\"o-container c-text-block__container\"><div class=\"c-text-block module-68e8104c287af\"><div class=\"o-container c-text-block__container\" data-wpr-lazyrender=\"1\"><div class=\"c-text-block module-68e8104c2ae3c\"><div class=\"o-container c-text-block__container\"><div class=\"c-text-block module-68e8104c2c016\"><div class=\"o-container c-text-block__container\"><div class=\"c-text-block module-68e8bdc6a8431\"><div class=\"o-container c-text-block__container\"><div class=\"c-text-block module-68e8bdc6a899a\"><div class=\"o-container c-text-block__container\"><p>In addition to testing, Networks provides guidance on where to concentrate security efforts within the organisation. This advice is based on the initial report generated from the testing as well as the expertise of the Networks team. By working with Networks, organisations can stay proactive and vigilant against phishing attacks, reducing the risk of data breaches and other security incidents.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7f72714 e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"7f72714\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;animation&quot;:&quot;zoomIn&quot;,&quot;motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c4ade56 elementor-widget elementor-widget-heading\" data-id=\"c4ade56\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Phishing Testing Services<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-499fd9e elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"499fd9e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">Contact Us\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e93fc2c elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"e93fc2c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"main-section\"><div class=\"container-main-1160\"><section class=\"main-section\"><div class=\"container-main-1160\">To discuss phishing testing and wider cyber security services, please get in touch:<\/div><div><div class=\"c-image-cta-bar__links\">\u00a0<\/div><\/div><\/section><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9a160a7 elementor-widget elementor-widget-button\" data-id=\"9a160a7\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/ee.networks.engineering\/index.php\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Email Phishing Testing Services Spam, phishing and advanced social engineering attacks represent a huge threat to organisations. Phishing Testing: Train [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-641","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/ee.networks.engineering\/index.php\/wp-json\/wp\/v2\/pages\/641","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ee.networks.engineering\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ee.networks.engineering\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ee.networks.engineering\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ee.networks.engineering\/index.php\/wp-json\/wp\/v2\/comments?post=641"}],"version-history":[{"count":0,"href":"https:\/\/ee.networks.engineering\/index.php\/wp-json\/wp\/v2\/pages\/641\/revisions"}],"wp:attachment":[{"href":"https:\/\/ee.networks.engineering\/index.php\/wp-json\/wp\/v2\/media?parent=641"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}