Back
Cyber Security Training & Software for Companies | MetaCompliance

Products

Discover our suite of personalised Security Awareness Training solutions, designed to empower and educate your team against modern cyber threats. From policy management to phishing simulations, our platform equips your workforce with the knowledge and skills needed to safeguard your organisation.

Cyber Security eLearning

Cyber Security eLearning to Explore our Award-Winning eLearning Library, Tailored for Every Department

Security Awareness Automation

Schedule Your Annual Awareness Campaign In A Few Clicks

Phishing Simulation

Stop Phishing Attacks In Their Tracks With Award-Winning Phishing Software

Policy Management

Centralise Your Policies In One Place And Effortlessly Manage Policy Lifecycles

Privacy Management

Control, Monitor, and Manage Compliance with Ease

Incident Management

Take Control Of Internal Incidents And Remediate What Matters

Back
Industry

Industries

Explore the versatility of our solutions across diverse industries. From the dynamic tech sector to healthcare, delve into how our solutions are making waves across multiple sectors. 


Financial Services

Creating A First Line Of Defence For Financial Service Organisations

Governments

A Go-To Security Awareness Solution For Governments

Enterprises

A Security Awareness Training Solution For Large Enterprises

Remote Workers

Embed A Culture Of Security Awareness - Even At Home

Education Sector

Engaging Security Awareness Training For The Education Sector

Healthcare Workers

See Our Tailored Security Awareness For Healthcare Workers

Tech Industry

Transforming Security Awareness Training In The Tech Industry

NIS2 Compliance

Support Your Nis2 Compliance Requirements With Cyber Security Awareness Initiatives

Back
Resources

Resources

From posters and policies to ultimate guides and case studies, our free awareness assets can be used to help improve cyber security awareness within your organisation.

Cyber Security Awareness For Dummies

An Indispensable Resource For Creating A Culture Of Cyber Awareness

Dummies Guide To Cyber Security Elearning

The Ultimate Guide To Implementing Effective Cyber Security Elearning

Ultimate Guide To Phishing

Educate Employees About How To Detect And Prevent Phishing Attacks

Free Awareness Posters

Download These Complimentary Posters To Enhance Employee Vigilance

Anti Phishing Policy

Create A Security-Conscious Culture And Promote Awareness Of Cyber Security Threats

Case Studies

Hear How We’re Helping Our Customers Drive Positive Behaviour In Their Organisations

A-Z Cyber Security Terminology

A Glossary Of Must-Know Cyber Security Terms

Cyber Security Behavioural Maturity Model

Audit Your Awareness Training And Benchmark Your Organisation Against Best Practice

Free Stuff

Download Our Free Awareness Assets To Improve Cyber Security Awareness In Your Organisation

Back
MetaCompliance | Cyber Security Training & Software for Employees

About

With 18+ years of experience in the Cyber Security and Compliance market, MetaCompliance provides an innovative solution for staff information security awareness and incident management automation. The MetaCompliance platform was created to meet customer needs for a single, comprehensive solution to manage the people risks surrounding Cyber Security, Data Protection and Compliance.

Why Choose Us

Learn Why Metacompliance Is The Trusted Partner For Security Awareness Training

Employee Engagement Specialists

We Make It Easier To Engage Employees And Create a Culture of Cyber Awareness

Security Awareness Automation

Easily Automate Security Awareness Training, Phishing And Policies In Minutes

Leadership

Meet the MetaCompliance Leadership Team

MetaBlog

Stay informed about cyber awareness training topics and mitigate risk in your organisation.

Phishing Terminology You Need To Know

phishing-terminology-you-need-to-know

about the author

Share this post

There has been a significant and constant rise in phishing attacks. They are becoming more effective and they are continuing to target more people. 

 that almost 30% of the people targeted by phishing email scams went on to open the email, and a further 13% went on to open the subsequent link, which is high considering any percentage is too high.  

No one is safe. Data breaches and data leaks have affected retailers, banks, US internal revenue service and universities, all off the back of phishing attacks. 

The term “phishing” is basically a hacker’s phrase for conning an online user, usually through email, with the aim of tricking them into revealing valuable information such as passwords, account numbers etc, or even downloading malware onto their PC. In other words, an online robbery. 

Check out our ultimate guide to phishing

These attacks are usually email-orientated on the basis of how easy it is for the scammers to impersonate other individuals, with fake return addresses included. There are four main kinds of phishing attacks:

 

  • Phishing 

 

This is an attempt to gain access to information, the likes of usernames, passwords and credit card details, by pretending to be someone you’re not, and hiding as a trusting entity through email. 

  • Spear Phishing  

Spear phishing is similar only as it is specifically directed at individuals or specific companies. Like hunters, they sought out their prey and they attack with accuracy. This technique of phishing is by far the most successful scam on the Internet today, as it makes up 91% of online attacks. 

  • Clone Phishing  

This is a phishing attack where, a formerly legitimate email containing links, has been taken and used to create an identical fraudulent email. Replacing the original link with a new malicious link, this is then sent from a fake email address, in an attempt to appear to come from the original email address.  

  • Whaling  

Whaling are the kind of attacks that are aimed at higher end personnel within companies, the likes of senior executives CEOs and CIOs. In this instance, the masquerading email usually takes the form of a customer complaint or an employee issue, in order to gain their attention. People in this position usually tend to have more valuable information and more financial power. 

Conclusion

Overall, phishing attacks produce two main victims. For example, the person who is being attacked and the company who is being impersonated. Essentially, if you were to receive an email that appears to be from your university, and it asks you to freely give up passwords and personal information – you have become a victim of fraud. Furthermore, the reputation of the university has been compromised and you are less likely to trust any genuine emails from your university from here on in.  

Phishing attacks are very real and they are only going to become a bigger threat, so remember to be vigilant and educate yourself and your organisation on the subject. 

Organisations can protect themselves against these types of phishing attacks by making sure that all of their employees are trained to watch out for suspicious activity. 

Other Articles on Cyber Security Awareness Training You Might Find Interesting