SPEAR SHIELD LTD TRUSTED CYBERSECURITY PARTNER IPSWICH, SUFFOLK HQ
UNDERSTAND HUMAN RISK WITH A FREE MANAGED PHISHING CAMPAIGN
"GAIN INSIGHT INTO RISK AND USERS SECURITY BEHAVIOURS"
"Phishing is the most effective attack vector for cybercriminals, yet too many businesses rely on off-the-shelf phishing templates that don’t reflect real-world threats. At Spear Shield, we take a spear phishing approach, crafting highly targeted simulations that mimic the tactics we see attackers using in the wild.
This free managed phishing campaign isn’t just about seeing who clicks - it’s about understanding user behaviours, identifying real risks, and providing actionable insights that you can articulate back to your business. With full reporting and behavioural analysis, you’ll gain a clear picture of your organisation’s resilience to phishing attacks.
And there’s no catch (to pardon the pun!) - this is simply a chance to experience working with us first-hand and see the true value of having Spear Shield as a cybersecurity partner." Josh Broadbent, CTO, Spear Shield
.png?width=2144&height=2252&name=Copy%20of%20SSS%20ITFC%20Nov%202024%20Promo%20(22).png)
HUMAN RISK LANSCAPE
WHY RUN A FREE MANAGED PHISHING CAMPAIGN?
- Slipping through the net
In 2024, there was a 52.2% increase in the number of attacks that got through Secure Email Gateway (SEG) detection and a 50.9% increase in attacks bypassing Microsoft’s native defences. - It started with a Phish...
61% of the root cause of ransomware attacks responded to in 2024 was introduced to an organisation through ‘human-activated risk’. Compromised credentials, malicious emails, phishing, downloads and more. -
Less than 60 seconds
The Median time to click on a malicious link after the email is opened is 21 seconds and then only another 28 seconds for the person caught in the phishing scheme to enter their data. The median time for users to fall for phishing emails is less than 60 seconds.
MANAGED PHISHING OVERVIEW
WHAT'S INCLUDED IN YOUR FREE MANAGED PHISHING CAMPAIGN?
- Spear Phish Campaign Templates
Campaigns based on real-world phish that we see in the wild - Full- Exec Ready Reporting incl User Behaviour Analysis
includes Click-Rate %, Credential Harvest %, Industry Benchmarking, Device Type Breakdown, User Behaviour Analysis, Consultative Recommendations, and more. - Spear Phish Campaign Templates
Campaigns based on real-world phish that we see in the wild
.png?width=2457&height=1927&name=Copy%20of%20SSS%20ITFC%20Nov%202024%20Promo%20(23).png)
"I have been working with Spear Shield for the past 2 years understanding human risk through their phishing simulation service and I can say the service has been thoroughly professional and second to none which has culminated in a tangible reduction in insider threat risk. I also congratulate Spear Shield for their passion and work elevating the importance of cyber security in our local and national business communities."
Kevin W. Head of Cyber and I.T. Security
DELIVERED AS A FULLY MANAGED SERVICE
HOW IT WORKS
- Step 1. Scoping call to discuss Campaign Ideas together
- Step 2. Send a CSV with User Details on
- Step 3. Whitelisting and Testing Delivery
- Step 4. Agree Campaign schedule
- Step 5. Present Results Together
OUR MISSION
What to expect on the call
Want to learn more about our Free Managed Phishing Campaign and how it can help uncover human risk in your organisation? Book a session with our CEO, Max Harper, to walk through the details, what’s included, and how we tailor the simulation to mimic real-world attacks.
We’ll cover:- How the free campaign works – A spear phishing simulation tailored to your business.
- What you’ll get – Full reporting, behavioural insights, and actionable recommendations.
- Next steps – How to use the results to enhance your security awareness strategy.
And if he’s not too busy phishing our customers, we’ll loop in our CTO, Josh, to share his expertise too!
RECENTLY SHARED
THE SPEAR BLOG

6 min read
Survival of the Phishest
{% module_block module "widget_76756cca-b1e2-452d-8055-6451cddff630" %}{% module_attribute "child_css" is_json="true" %}{}{% end_module_attribute %}{% module_attribute "css" is_json="true" %}{}{% end_module_attribute %}{% module_attribute "definition_id" is_json="true" %}null{% end_module_attribute %}{% module_attribute "eyebrow" is_json="true" %}[]{% end_module_attribute %}{% module_attribute "field_types" is_json="true" %}{"styles":"group","heading":"text","subheading":"text","heading_level":"choice","eyebrow":"text","text":"richtext","cta":"group","add_cta":"boolean","section_id":"text"}{% end_module_attribute %}{% module_attribute "heading" is_json="true" %}""{% end_module_attribute %}{% module_attribute "label" is_json="true" %}null{% end_module_attribute %}{% module_attribute "module_id" is_json="true" %}114468600782{% end_module_attribute %}{% module_attribute "path" is_json="true" %}"@marketplace/Lynton/Brightlane/pages/modules/Theme Rich Text"{% end_module_attribute %}{% module_attribute "schema_version" is_json="true" %}2{% end_module_attribute %}{% module_attribute "smart_objects" is_json="true" %}[]{% end_module_attribute %}{% module_attribute "smart_type" is_json="true" %}"NOT_SMART"{% end_module_attribute %}{% module_attribute "tag" is_json="true" %}"module"{% end_module_attribute %}{% module_attribute "text" is_json="true" %}"Why Email Attacks Are Getting Smarter - and How to Stay Ahead
\nIn the ever-evolving world of cyber threats, email remains the front door to your business.
\n
4 min read
Why MDR is no longer a luxury - it's the backbone of modern cyber resilience
{% module_block module "widget_76756cca-b1e2-452d-8055-6451cddff630" %}{% module_attribute "child_css" is_json="true" %}{% raw %}{}{% end_module_attribute %}{% module_attribute "css" is_json="true" %}{}{% end_module_attribute %}{% module_attribute "definition_id" is_json="true" %}null{% end_module_attribute %}{% module_attribute "eyebrow" is_json="true" %}[]{% end_module_attribute %}{% module_attribute "field_types" is_json="true" %}{"styles":"group","heading":"text","subheading":"text","heading_level":"choice","eyebrow":"text","text":"richtext","cta":"group","add_cta":"boolean","section_id":"text"}{% end_module_attribute %}{% module_attribute "heading" is_json="true" %}""{% end_module_attribute %}{% module_attribute "label" is_json="true" %}null{% end_module_attribute %}{% module_attribute "module_id" is_json="true" %}114468600782{% end_module_attribute %}{% module_attribute "path" is_json="true" %}"@marketplace/Lynton/Brightlane/pages/modules/Theme Rich Text"{% end_module_attribute %}{% module_attribute "schema_version" is_json="true" %}2{% end_module_attribute %}{% module_attribute "smart_objects" is_json="true" %}[]{% end_module_attribute %}{% module_attribute "smart_type" is_json="true" %}"NOT_SMART"{% end_module_attribute %}{% module_attribute "tag" is_json="true" %}"module"{% end_module_attribute %}{% module_attribute "text" is_json="true" %}{% raw %}"Cyberattacks aren't slowing down. But traditional security operations can't keep up.
\nThe gap between attack speed and detection speed is widening. While businesses scramble to add more tools and plug more gaps, many still struggle with alert fatigue, skills shortages, and slow response times. Sound familiar?
\nReady to take a human centric approach and level-up security in your organisation together?
YOU MAY NEED TO KNOW
Frequently Asked Questions
Can’t we just run phishing simulations ourselves?
You could — but the difference is in the delivery. We remove all the guesswork, vet every click to exclude false positives like scanners and bots, and present the results clearly. No manual data cleaning, no missed insights — just real human behaviour, accurately measured.
We already have a phishing platform — why use this service?
Having a platform is one thing. Using it effectively is another. You’d still need to scope clients, pick relevant templates, manage whitelisting, and build reports. With Spear Shield, you get expert-curated campaigns built around what’s actually bypassing email defences — all fully managed, and branded to you.
How much time does this take to manage?
Very little. You simply pick a campaign, fill out a form, and we handle everything else — including whitelisting guidance, delivery, tracking, and reporting. It’s designed to scale without adding to your workload.
Will users get annoyed by these tests?
Not at all. Our simulations are designed to mimic real threats without disruption. If a user clicks, they’re taken to a branded training page — no lectures, no public call-outs. Just clear, constructive feedback in the moment that matters most.
What if a customer wants a custom phishing template?
We include a wide range of relevant, real-world templates as standard. However, if your customer wants something bespoke — such as a scenario tailored to a specific brand, process, or department — we can build a custom Spear Phish Pack for a one-off fee of £100.
Will the reporting be branded to us?
Yes — every touchpoint is white-labelled, including reports and training pages. Your logo, your presence, our delivery.