Just a moment, logging you in...
An anti-phishing training with the use of Attack Simulator (part of the Office 365 ATP Plan 2) is an offer to perform an interactive training session for your company.
a. Vulnerability for malicious attachments – internal e-mail from the HR dept4. A summary report with the general vulnerability assessment
b. Vulnerability for malicious attachments – external e-mail with a hotel booking / invoice
c. Identity theft vulnerability – internal e-mail with a OneDrive link
d. Identity theft vulnerability – external e-mail, imitating a LinkedIn notification
To deliver a successful campaign, the necessary preparations include:
a. Trends, according to the campaign type
b. Detailed statistics matched with the end-users
c. Recommendations, suggested solutions.