With the Phish Device Report, Admins can identify the device-type used by staff who have interacted with a phish. In doing so, Admins can spot patterns in behaviour, determine where the risks lie and whether additional training is required.
MetaBlog
Stay informed about cyber awareness training topics and mitigate risk in your organisation.
Identify Devices Used by Phish Victims
- Kerri McCallion
- Did you know

about the author
Kerri McCallion
Share this post
you might enjoy reading these

The Essential Link Between Policy Management and Security Awareness
Noel Burns November 24, 2023
Organisations constantly face the complex task of securing sensitive data and fortifying defences against a multitude of cyber threats. One often underestimated but integral aspect
Read More » 
Emerging Technologies and Their Impact on Cyber Security
Conor ODoherty November 24, 2023
In the ever-evolving landscape of digital innovation, the surge of emerging technologies brings both unprecedented opportunities and formidable challenges, particularly in the realm of cyber
Read More »