Turn “human risk” into measurable resilience - using Microsoft 365.

Test user behaviour and identify high-risk users.

Wanstor’s Phishing & Attack Simulation Training

Phishing and social engineering continue to be among the most common entry points for cyber incidents, often triggered by simple user actions like clicking a malicious link or entering credentials into a fake site.

Wanstor’s managed Microsoft 365 Attack Simulation Training service helps you reduce that risk by combining quarterly company-wide training, bi‑monthly simulated attacks, and clear reporting – so you can improve behaviour over time and prove it with data.

If you want to:

  • Validate whether training is working (not just delivering it)
  • Reduce human-led security incidents without adding operational workload
  • Get reporting you can share with leadership and governance teams
  • Use Microsoft 365’s native simulation capability effectively and consistently

What’s included

Wanstor configures and maintains the training and phishing simulation capabilities available through the appropriate Microsoft 365 licence.

    Included as standard:

    • Quarterly company-wide training programme for all users
    • Attack simulations every two months to identify gaps and test whether training is sticking
    • Targeted training assignments for users/groups based on simulation outcomes (with due dates and reminders)
    • Monthly management reporting covering completion, gaps and outcomes
    • Ongoing optimisation of campaigns and training assignments to match your environment and risk profile

    What we simulate

    Attackers don’t just use email – they use multiple channels and increasingly combine them. We help your users recognise common phishing patterns, including:

    • Email phishing (fraudulent emails designed to drive clicks, malware, credential theft or data loss)
    • Whaling (highly targeted executive impersonation attempts)
    • Vishing (voice/telephony phishing)
    • Smishing (SMS/text phishing)
    • Pharming (redirecting traffic to malicious destinations)

    The practical focus: teach teams what to look for and how to respond – then validate it with simulations.

     

    Training approach

    Company-wide training (quarterly)

    Wanstor assigns quarterly global training packages for all users, covering topics such as: email security, PCI DSS (data security standard), social engineering and data security.
    Training also covers what users should do if they suspect they’ve been targeted or compromised.

    Targeted training (based on results)

    Users who interact with simulated attacks can be assigned targeted training with configured deadlines and reminder notifications.

    Training assignment options:

    • Microsoft assigns courses/modules automatically based on simulation outcomes (“Assign Training for me”)
    • Or we can select specific modules aligned to your scenario and risks

    Due dates can be set 7, 15 or 30 days after the end of the simulation.

    Reporting

    After each campaign, Wanstor provides a report (after 30 days) covering:

    • Scope and who was targeted
    • Methodology and simulation technique used
    • Number of reported emails (if applicable)
    • Who clicked links and who was compromised
    • Who completed assigned training

    We also report company-wide training completion and ensure new starters are assigned training.

    Pre-requisites

    To maximise effectiveness, the onboarding process includes:

    • Appropriate Microsoft 365 licences (see below)
    • Administrative accounts/permissions (e.g., M365 global admin and any in-scope platform accounts)
    • Outlook reporting plugin (recommended), plus user instructions for reporting phishing emails
    • External email tagging/banner configuration (recommended) to clearly identify external senders

     

    Licensing:

    Licences required include (or a combination thereof):

    • Office 365 E5
    • Microsoft 365 E5
    • Microsoft 365 E5 Security
    • Microsoft 365 A5 Security / Microsoft 365 A5
    • Microsoft 365 F5 Security / F5 Security and Compliance
    • Bolt‑on licences

    Ready to prove your people can spot a real attack?

    We’ll scope your programme, configure Microsoft 365 Attack Simulation Training, run bi‑monthly simulations, and deliver reporting that shows exactly where risk is improving - and where to focus next.