MetaBlog

Stay informed about cyber awareness training topics and mitigate risk in your organisation.

Identify Devices Used by Phish Victims

devices 1

about the author

Share on linkedin
Share on twitter
Share on facebook

With the Phish Device Report, Admins can identify the device-type used by staff who have interacted with a phish. In doing so, Admins can spot patterns in behaviour, determine where the risks lie and whether additional training is required.

you might enjoy reading these