With the Phish Device Report, Admins can identify the device-type used by staff who have interacted with a phish. In doing so, Admins can spot patterns in behaviour, determine where the risks lie and whether additional training is required.
MetaBlog
Stay informed about cyber awareness training topics and mitigate risk in your organisation.
Identify Devices Used by Phish Victims
- Kerri McCallion
- Did you know
about the author
Kerri McCallion
Share this post
Other Articles on Cyber Security Awareness Training You Might Find Interesting
Leveraging Localisation in Your Security Awareness Program
Jyri Pohja
April 5, 2024
In today’s interconnected world, cybers security threats know no borders. From phishing scams to malware attacks, cybercriminals exploit vulnerabilities wherever they may be found. As
Read More »
Strengthening Cyber Defence in Higher Education
Sakib Rashid
March 12, 2024
Recent reports from the DSIT indicate that 85% of higher education institutions have experienced breaches or attacks within the past 12 months. Security Awareness Training
Read More »