Phishing Evolution
Our Phishing Evolution training helps staff stay ahead of increasingly sophisticated email and messaging scams. Through realistic examples and interactive scenarios, learners discover how phishing tactics are changing and what to do when something looks suspicious.
All Phishing Evolution 13 Results
Phish Finder Fundamentals is an interactive game-based challenge where you are tasked with uncovering the hidden dangers lurking in your inbox.
Your staff need to be aware of the savvy social engineering tactics and trends to protect themselves, their families and the organisation from becoming a victim of voice scams.
Your staff need to be aware of the savvy social engineering tactics and trends to protect themselves, their families and the organisation from becoming a victim of voice scams.
Your staff need to be aware of the savvy social engineering tactics and trends to protect themselves, their families and the organisation from becoming a victim of voice scams.
Vendor Email Compromise (VEC) is a type of scam that targets companies that do business with third-parties and frequently conduct transfers for payment. A VEC attack can disrupt the whole supply chain, causing trouble for both vendors and their customers.
Scammers developed Smishing tactics to tap into the trusting nature of text messaging. Empower your staff to spot a Smishing attack.
Scammers developed Smishing tactics to tap into the trusting nature of text messaging. Empower your staff to spot a Smishing attack.
Join Phish Finder, an interactive game-based challenge where you become a cyber sleuth tasked with uncovering the hidden dangers lurking in your inbox.
Employees will discover the simple, and highly effective scams using malware or social engineering in this short course.
Employees will discover the simple, and highly effective scams using malware or social engineering in this short course.
Angler phising is a cyber attack targeting individuals on social media platforms, online forums or other online communities. This course helps you identify and protect yourself against an angler phishing attack.
This course will outline the different levels of risk associated with BEC attacks, focusing on the different types of tactics used by cybercriminals to compromise accounts.
Get expert guidance to match your people with the right awareness training for maximum impact.
Sort by