Phishing Attacks.jpg
Cyber Security Guide for Employers

Get informed, stay protected

Table of contents:

  • How your data gets compromised
  • Spotting an attack
  • Example emails
  • Avoid becoming a victim
  • The targets
  • What's at risk?
  • How cyber criminals plan their attacks
  • Impersonation
  • Fake president fraud
  • Whaling
  • Urgent requests
  • Unexpected refunds, payments and contests
  • Phishing vs. spear phishing
  • Vishing
  • Additional considerations for employers

Download Your Free Guide