FREE DOWNLOAD
Cyber Security Guide for Employers
Get informed, stay protected
Table of contents:
- How your data gets compromised
- Spotting an attack
- Example emails
- Avoid becoming a victim
- The targets
- What's at risk?
- How cyber criminals plan their attacks
- Impersonation
- Fake president fraud
- Whaling
- Urgent requests
- Unexpected refunds, payments and contests
- Phishing vs. spear phishing
- Vishing
- Additional considerations for employers