MetaBlog

Stay informed about cyber awareness training topics and mitigate risk in your organisation.

Identify Devices Used by Phish Victims

devices 1

about the author

With the Phish Device Report, Admins can identify the device-type used by staff who have interacted with a phish. In doing so, Admins can spot patterns in behaviour, determine where the risks lie and whether additional training is required.

you might enjoy reading these

Cyber Secure on Social Media

Staying Cyber Secure on Social Media

In today’s digital age, cybercriminals are becoming increasingly sophisticated, targeting users through various methods on social media. According to a study conducted by Cybersecurity Insiders,
Read More »