How Social Media is used as a Phishing Tool would be my favourite Nano video in the library – it highlights how Cybercriminals harvest social media apps to exploit the end-users through something as simple as a competition. For me, this Nano stands out as it educates end-users both in a professional capacity and carries into their personal life. As Facebook, LinkedIn, and other Social Apps continue to grow, it’s vital that your employees understand the dos and don’ts and understand the risks when using the apps.
MetaBlog
Stay informed about cyber awareness training topics and mitigate risk in your organisation.
What is your favourite eLearning
- Kerri McCallion
- December 14, 2021
- Customer Suсcess

about the author
Kerri McCallion
Share on linkedin
Share on twitter
Share on facebook
you might enjoy reading these

What is a Phishing Simulation?
James MacKay August 9, 2022
Phishing is a serious problem for companies of all sizes and all sectors. But by using phishing simulation exercises, an organisation can take control of
Read More » 
5 Examples of Social Engineering Attacks
James MacKay July 26, 2022
Here is a look at how social engineering attacks happen and what you can do to prevent your staff from being socially engineered.
Read More »