In cases of “Phishing”, attackers try to gain access to sensitive information or install malicious software via various channels of communication (e-mail, phone, text message). The criminals pretend to be trustworthy individuals or companies and – if they are successful – may cause considerable harm to your company. In this staff training, your employees will get to know different kinds of attacks, such as spear phishing, whaling, vishing, smishing or blackmail via e-mail, in the course of an interactive story. They will learn not only how to recognize attacks but also how to counter them. In this way, this web-based training can increase your company’s IT security and contribute to protecting sensitive company-internal data. This course is suitable for trainings in conformity with the European Union’s new NIS Directive (2016/1148).
|Publication Date||12/16/2022, 9:54:54 AM|
|Languages||DE, EN |
Translations into other languages can be ordered or done by yourself.
- Attacks via E-Mail (Phishing)
- What Is Phishing and What Are Attackers‘ Intentions?
- Possible Targets
- Types of Phishing
- Recognizing Phishing Mails and Acting in the Right Way
- Example 1
- Example 2
- Example 3
- Blackmail via E-Mail
- Attacks via Phone (Vishing)
- Attacks via Text Message or Messenger (Smishing)
We are glad to help you via email ([email protected]) or phone (+43 512 214037).