With the Phish Device Report, Admins can identify the device-type used by staff who have interacted with a phish. In doing so, Admins can spot patterns in behaviour, determine where the risks lie and whether additional training is required.
Stay informed about cyber awareness training topics and mitigate risk in your organisation.
Identify Devices Used by Phish Victims
about the author
you might enjoy reading these
Staying Cyber Secure on Social Media
In today’s digital age, cybercriminals are becoming increasingly sophisticated, targeting users through various methods on social media. According to a study conducted by Cybersecurity Insiders,Read More »
Key Metrics for Measuring Security Awareness Training
In recent years, Security Awareness Training has gained significant attention in the boardrooms of organisations worldwide. This shift in focus reflects a growing realisation amongRead More »