Visualize your human risk with the Hoxhunt Challenge

Welcome to the Hoxhunt Challenge, a cybersecurity benchmark study that visualizes the state of your organization’s human risk.

Participate in the Hoxhunt Challenge to test how you fare in an attack simulation produced by our cybersecurity consultants and compare your results against your industry’s benchmark data.

Applications for the Hoxhunt Challenge are currently closed. Read the results and download the data analysis pdf at Don’t scan! Insights from the Hoxhunt cybersecurity human risk benchmark challenge

Gain visibility into your organization’s readiness

By participating in the Hoxhunt Challenge, you’ll test your resiliency against a de-weaponized real-world attack scenario and see how your organization would fair against a real phishing attack. With the Hoxhunt Challenge Benchmark, you'll get to compare your results anonymously against peers and understand how you rank within your industry. This way, you’ll gain visibility into your human risk and understand what you can do to improve.

How it works

Step 1

You will have a discussion with our cyber security expert to assess your organization’s current situation

Step 2

We execute the challenge program and measure your organization’s human risk with the de-weaponized attack

Step 3

We provide results of your organization’s resilience and help analyze what the results mean for your company

Ready to see how you compare?

Assess your current level of human risk
Compare results anonymously against peers
Evaluate your rank within your industry
Identify strategies for enhancing your performance
Elisa Logo

Landmark study on phishing resilience

Together with Elisa, Hoxhunt did a phishing benchmark study in which the same simulated phishing attack was sent to 3,000 users from 12 organizations, only one of which (FinGrid, Finland’s main power grid supplier) uses Hoxhunt's security behavior change training.

Read the full story
Did you know?

9 of 10 cyber breaches include a human element

In a typical breach, an employee unintentionally interacts with a malicious email. That interaction results in the employee’s credentials leaking out or your company getting infected with a virus. CISOs understand that even with technical protections and firewalls, training humans to understand and recognize digital threats fortifies the organization against attacks.

Did you know?

9 of 10 cyber breaches include a human element

In a typical breach, an employee unintentionally interacts with a malicious email. That interaction results in the employee’s credentials leaking out or your company getting infected with a virus. CISOs understand that even with technical protections and firewalls, training humans to understand and recognize digital threats fortifies the organization against attacks.

Applications are closed!

Sign up for our newsletter to find out when they open again.

Participate in the Challenge

Sign up for a free, no-commitment 30-minute session with our cyber security expert to discuss your organization’s current state of human risk and learn more about how you can benefit from the Hoxhunt Challenge.

After applying

One of our experts will reach out to you to schedule your consultancy session.

More secure with Hoxhunt

Changing behavior reduces the risk of all types of email attacks, from business email compromise to account takeovers to supply chain fraud and ransomware. Our advanced AI engine and machine learning algorithms transform your employees into a global network of threat detection sensors that will protect themselves and your organization from threats that have infiltrated your perimeter.

Changing behavior reduces risk of all types of email attacks, from business email compromise to account takeovers to supply chain fraud and ransomware. Our advanced AI engine and machine learning algorithms transform your employees into a global network of threat detection sensors that will protect themselves and your organization from threats that have infiltrated your perimeter.

In order to participate:

You’ll receive a follow on instructions on how to participate. You will need the following stakeholders from your company in order to participate

  • Legal: Agreement signed
  • Technical: Technical setup completed