IT Security
Phishing Simulation Email
Train staff to spot cyber attacks with a fake phishing example.
Updated: January 26, 2026
What does this AI prompt do?
This AI prompt helps UK SMEs by providing a ready-to-use template for train staff to spot cyber attacks with a fake phishing example.. Simply copy the template below, customize the variables for your business, and paste into any AI tool like ChatGPT or Claude.
AI Prompt Template
Act as a specialist consultant. **Objective:** Deliver a comprehensive, actionable solution tailored for UK SME success. Here are three improved versions of the business prompt template, maintaining the exact structure and variables while focusing on enhanced clarity, persuasiveness, and driving better results: --- ## Option 1: Focus on High-Impact Realism and Immediate Action I need to conduct a **highly realistic and impactful phishing awareness drill.** Please generate the following two outputs, ensuring the first is designed to *immediately engage and test* staff vigilance: 1. **Simulated Phishing Attack:** Craft a *convincing, yet entirely fake* phishing email, purportedly originating from **'[Fake Sender | text]'**. The core call-to-action must be an urgent request for an immediate password reset. 2. **Post-Drill Debrief Document:** Following the simulated email, produce a clear, concise document explicitly detailing all the critical **'Red Flags'** embedded within the phishing attempt (e.g., discrepancies in the sender address, aggressive/urgent tone, generic greetings) to maximize post-training retention. --- ## Option 2: Focus on Specificity and Measurable Learning Outcomes For the purpose of effective security training, I require two distinct deliverables: 1. **Realistic Phishing Scenario:** Develop a *masterfully crafted, entirely fictional* phishing email, pretending to be from **'[Fake Sender | text]'**. This email must employ common social engineering tactics, specifically demanding an **immediate password reset** to maximize trainee engagement. 2. **Targeted Educational Analysis:** Immediately follow this with a structured document that acts as the answer key, breaking down every single security vulnerability present. This 'Red Flags' analysis must clearly enumerate all warning signs (e.g., examining header information, analyzing urgency markers, checking linked URLs) for immediate post-test review. --- ## Option 3: Focus on Professional Tone and Comprehensive Training Aid To enhance our internal security posture, please create a comprehensive two-part training module: 1. **Authentic Phishing Simulation:** Write a *professional-grade, completely fabricated* phishing attempt, appearing to originate from **'[Fake Sender | text]'**. The primary objective of this email must be to fraudulently induce recipients into performing an **urgent password reset**. 2. **Instructive Remediation Guide:** Concurrently, produce a corresponding instructional document titled 'Red Flags Analysis.' This guide must systematically identify and explain every manipulative element used in the simulated email (e.g., scrutinizing display names versus actual email addresses, dissecting emotional manipulation tactics, reviewing suspicious hyperlink construction).
How to use this prompt:
- Copy the template above
- Customize the variables in brackets [like this] with your business details
- Paste into ChatGPT, Claude, or your preferred AI tool
- Get professional results in minutes
Why this works:
This prompt uses proven business frameworks and UK-specific requirements. It's designed to give you professional results that comply with local regulations and industry best practices.