How To’s: Your go-to when in doubt

No more jargons. We break down cybersecurity using plain language. Explore our living library of manuals, useful links, and practical articles that help you become more confident in your security practices.

Learn how to quickly get the hang of ATTACK Simulator

You might have trouble getting started with ATTACK Simulator. Don’t worry, it’s ok, we’re here to help. Find out:

 

  • How to get started
  • How to create your first simulation
  • How to whitelist
  • How to understand reports
14 Phishing Techniques Your Employees Need To Be Aware Of

14 Phishing Techniques Your Employees Need To Be Aware Of

The Internet is a wonderful place where you can find answers to almost anything, but nasty threats lurk in its dark corners, waiting for the perfect victim to "phish." Phishing techniques are becoming sneakier and more sophisticated as technology becomes more...

Quick guide to 6 common types of phishing

Quick guide to 6 common types of phishing

Phishing is a cybercrime that uses different tactics, such as deceptive emails, websites and text messages, in order to obtain users ‘personal information. Attackers use the obtained information for identify theft and fraud.   From phreaking to phishing The term...

How to install the ATTACK Simulator Outlook Add-in

How to install the ATTACK Simulator Outlook Add-in

Our plugin allows Outlook users to identify our phishing simulations or report suspicious email to system admins. Visit the Microsoft 365 Admin Center Go to Settings/Integrated apps and select Add-ins On the add-ins page, click Deploy Add-in During the Deploy wizard,...

How to install the ATTACK Simulator Gmail Plugin

How to install the ATTACK Simulator Gmail Plugin

Our plugin allows Gmail and GSuite users to identify our phishing simulations or report suspicious email to system admins. Open the Google Marketplace that you can find in your account Click the Domain Install button Select continue on the Domain install popup. Review...

No more “Son, how do I…?” Find your answers here

Computer security can be an intimidating subject. We prepared a few guides to get you started.

  • Introduction to Antivirus Solutions
  • Introduction to VPNs
  • Security when working from home
6 More Common Phishing Scams Your Employees Should Be Aware Of

6 More Common Phishing Scams Your Employees Should Be Aware Of

This article will walk you through 6 More Common Phishing Scams you and your employees should keep an eye out for in 2021. Phishing techniques have become more cunning, subtle, and more difficult to tell from the real deal. The bad guys never sleep, but neither...

Phishing Prevention: 8 Dead Giveaways That You’re Being Phished

Phishing Prevention: 8 Dead Giveaways That You’re Being Phished

Nowadays, it's no secret that bad guys love to go phishing and throw the bait to the most unsuspecting targets: your employees. In this article, we'll walk you through the 8 most common red flags of a phishing email to help you boost phishing prevention in your...

9 Identity Theft Signs & What To Do If You Became A Victim Of It

9 Identity Theft Signs & What To Do If You Became A Victim Of It

Do you suspect you've fallen victim to identity thieves? Then, check these 9 identity theft signs and recommendations in the unfortunate case you've been scammed. Identity theft is when someone pretends to be you after stealing your personal information and using it...

Adware Infections: Signs, Removal, And 9 Prevention Tips

Adware Infections: Signs, Removal, And 9 Prevention Tips

Adware infections have a set of unmistakable symptoms, which we will walk you through in this article. So keep reading to learn how to spot, remove, and prevent adware infections. Signs Of Adware Infections Keep an eye out for the following symptoms if you suspect you...

Top 4 Tricks Used In CEO Fraud Attacks

Top 4 Tricks Used In CEO Fraud Attacks

Scammers are getting more creative with their strategies by the day when it comes to CEO fraud attacks. This article will walk you through the sneakiest and most popular tricks in a hacker's arsenal. What Is CEO Fraud And How Do CEO Fraud Attacks Work? CEO fraud...