Vishing uses voice and social engineering to deceive your employees during a phone call.
Thanks to the simulations and scenarios I set up, your teams will learn to detect manipulation techniques and react calmly when faced with a malicious caller.

What is vishing?
Vishing is an attack based on a fraudulent phone call aimed at manipulating an employee to obtain information, validate a transaction, or perform a risky action.
The objective: to exploit the pressure, urgency, or apparent credibility of the caller to push the user to act without verifying the authenticity of the request.
These attacks frequently target:
- financial and accounting services,
- HR and administrative teams,
- internal assistance or technical support,
- employees who can be manipulated by hierarchical pressure.
Why simulate vishing?
- To explain the manipulation techniques specific to social engineering.
- To prepare teams to handle pressure, urgency, and stress.
- To identify unusual or sensitive requests made over the phone.
- To reduce the risks associated with CEO fraud or fake technical support.
- To establish simple reflexes: check, identify...*

How do I work?
-
1. I create credible scenarios based on real cases.
I imitate frequently used behaviors: urgency, authority, fake service providers, management, banking, IT support, etc.
-
2. I simulate targeted calls
I contact the teams or departments most exposed to analyze their reactions to unusual requests.
-
3. I evaluate “social engineering” signals.
Pressure, haste, false sense of confidence: I identify moments when employees can be manipulated.
-
4. I provide immediate educational feedback.
I explain to them what should have raised alarm bells: tone, vocabulary, unusual request, lack of procedure.
-
5. I provide a clear report on the reactions observed.
Without stigmatization, I highlight areas for improvement and reflexes to reinforce.
V.I.S.H.E.R.: simple and accessible best practices
V.I.S.H.E.R. is a mnemonic device I created for your employees to help them respond to a suspicious call in a matter of seconds.
It outlines the key points to check in order to spot an attempt at social engineering.










