Go.Phishing

Proactive Phishing Simulation & Security Awareness Training Platform

Why Phishing Simulations Are Important?

Recent statistics show phishing threats continue to rise. Since 2019, the number of phishing attacks has grown by 150% per year— with the Anti-Phishing Working Group (APWG) recording 1,003,924 phishing attacks in Q1 2025, the highest since late 2023.

In early 2025, phishing scams using AI to generate convincing emails targeted Gmail, Outlook, and Apple Mail users, leading to a spike in identity theft and financial fraud.

Phishing simulations reduced real phishing email clicks by 76%, per a 2022 Meta study.

Phishing Statistics

What's the Most Common Link in Data Breaches?—Human Error

According to Verizon's 2025 Data Breach Investigations Report:

Phishing Statistics

2025 DBIR Fast Facts

Cause
60%
of data breaches are caused by
human error and phishing, suggesting the fact that:

Human error remains a major factor
Risk Factor
17%
of breach incidents involves
phishing emails as the initial access point.

Phishing is a primary breach entry points
Mitigation
4x
more likely to report phishing
when employees are trained on phishing in the last 30 days.

Phishing simulations can plateau

Combatting Phishing Threats with X-Shield: GO.PHISHING Simulation Platform

Traditional Security Setup

Planning

Simulation Content

Traditional Security Setup

Analyzing

Detailed Report

Traditional Security Setup

Testing

Progress Monitoring

Traditional Security Setup

Learning

Educational Resources

More than a Simulation Campaign...

A Proactive Security Awareness Training Platform Enhance Employees Security Awareness

Traditional Security Setup

Engaging visual content to learn cybersecurity knowledge

Traditional Security Setup

Quiz to access & reinforce key concepts

Traditional Security Setup

Summarize the outcomes and gain insights into future security awareness training

Traditional Security Setup

Cope with real world phishing attack attempts

A continuous approach that equips your workforce with the skills and confidence to recognize, report, and respond effectively to phishing threats.

…By transforming employees from a potential vulnerability into a resilient line of defense, we help to strengthen your overall security posture and reduces the risk of costly security breaches.

Step-by-step Execution

How to run a phishing simulations campaign How to run a phishing simulations campaign

Traditional Security Setup
01
Plan for objectives and scope
Traditional Security Setup
02
Choose a phishing template
Traditional Security Setup
03
Schedule timeline and frequency
Traditional Security Setup
04
Define targets and send out
Traditional Security Setup
05
Monitor and analysis the data
Traditional Security Setup
06
Follow-up training & assessment

Platform Strengths

Traditional Security Setup

Realistic Templates


· Localized email content

· Simulate multiple scenarios

· Closely resemble the real-life threats

Traditional Security Setup

Bilingual E-Learning


· Cantonese & English platform interface

· Cantonese narration & voiceovers

· Make learning vividly

Traditional Security Setup

Professional Courseware


· Crafted content and materials

· Engaging videos

· Complete Knowledge Structure

Traditional Security Setup

Interactive Assessment


· Follow-up online quiz

· Instant result & feedback

· Pinpoint the knowledge gaps

What Value Does GO.PHISHING Deliver?

The phish-prone percentage of an organization before and after deploying

28%
5%
A: Initial Baseline
B: After Training

* Phish-prone percentage refers to the percentage of employees that are prone to click on a phishing link

Assessment Report

Traditional Security Setup

After the test, organizations will get a detailed summary report.

It can:

· Help organization's security department to measure and analyze the results, and

· Use the insights to pinpoint the vulnerability and improve upon their future security training

Step-by-step Execution

Campaign Summary
Traditional Security Setup
Campaign Details: Campaign Title,start date, end date, and status
Traditional Security Setup
Audience Reach: Segmentation, coverage, receipt percentage
Traditional Security Setup
Key Metrics: Open rate, click rate,credential entry rate, report rate

Eg.: Total of {} campaigns were launched since {dd-mm-yy}; {} out of {} users failed at least one campaign {XX%}

Key Findings and Outcomes
Traditional Security Setup
User Behaviour: clicks, downloads, or whether provided sensitive info
Traditional Security Setup
Phish-failure Percentage: Collect and measure by departments
Traditional Security Setup
Areas to improve: departments that may need additional training

The percentage is relatively high – if over 30%

The percentage is normal to slightly high – if 10% ~ 29%

Objectives – to reduce failure rate under 10%

About

Traditional Security Setup

Trusted by

Traditional Security Setup
Traditional Security Setup
Custom-Built


· Designed and deployed securely

· Internal system without relying on third-party services

· Ensure data privacy since it's hosted privately

· Customizable phishing scenarios

· Control over campaign execution and reporting

Traditional Security Setup
Gov-Endorsed


· Rolled out a territory-wide cybersecurity training initiative

· Deployed by governmental sectors

· Provided training for 150,000+ civil servants

· Demonstrating proven effectiveness in large-scale cybersecurity education·

Traditional Security Setup
Proven, Scalable


· Comprehensive educational resources

· Engaging visual and formats including videos and quizzes

· Proven by HK Gov body for its large-scale effectiveness and long-term viability in public sector cybersecurity education and training

Ready to Secure Your Business?

Get in touch with our cybersecurity experts to discuss how we can help protect your organization from evolving threats.

Contact Us Today