SPF, DKIM and DMARC: why are they important and how can you set them up?
What are SPF, DKIM and DMARC? How do they contribute to setting up protection against phishing attacks and how can you set them up for your company domain?
What are SPF, DKIM and DMARC? How do they contribute to setting up protection against phishing attacks and how can you set them up for your company domain?
Who are Initial Access Brokers and what do they do? What are some of their techniques, and how can you protect your company against them?
Why does a simple phishing email threaten an entire company? How do hackers move on from a low-level account to significant privileges, and, eventually, deploy a ransomware?
What are the drivers at play that lead to people clicking on phishing emails? And what can companies do about this to bolster their cybersecurity?
Why do humans love to play? And how can using these principles and relying on gamification help your cyberdefense?
Anti-spams are great! But hackers have elvoved to counter them and developed techniques to bypass them and successfully execute phishing campaigns.
Here are 10 must-haves for any training to be effective at lastingly changing users' behavior with regard to phishing attacks.