Non-binding inquiry

* = Mandatory fields

How Protforce handles your data and what your rights in this context are can be found here


Call us today!

We are happy to help!


Jeremy James Hakelberg

Business Development Manager

Icon Phone +49 611 724 9813 0
Contact now


When the human factor becomes a security risk

Phishing is one of the most common attack methods used by hackers.

In phishing, attackers use fake emails, among other things, to ask your victims to disclose personal information, such as usernames and passwords, open malicious attachments or visit URLs under the attacker's control.

In times of digitalization, the human factor is still the biggest security risk. That is why companies increasingly use spam filters, firewalls and anti-virus programs to eliminate the threat of Phishing.

However, the constantly changing threat scenarios combined with increasing communication via electronic media often push the security systems used to their limits.

At this point, the attention and security awareness of every single employee is required to stop the attack attempt in its early stages.

Even a single successful Phishing attempt can cause lasting damage to a company.

Authentic & Effective

We use customized Phishing campaigns to evaluate the current state of security awareness of your employees.

A Phishing campaign consists of individual and realistic Phishing scenarios, which are specifically designed for your business units. For example, we integrate services used by the company, which are used by employees within their daily work routines. The objective of the Phishing campaign can be defined individually with the company and can include password entry, calling up a URL, opening an attachment or other conceivable scenarios.

Within the framework of compliance with the DSGVO, the evaluations of our Phishing campaigns are always anonymized.

The results are compiled in a comprehensible report containing concrete recommendations for further action. At this point, Protforce not only looks at the behavior of the employees but also at the technologies they use and the resulting problems.