How To’s: Your go-to when in doubt

No more jargons. We break down cybersecurity using plain language. Explore our living library of manuals, useful links, and practical articles that help you become more confident in your security practices.

Learn how to quickly get the hang of ATTACK Simulator

You might have trouble getting started with ATTACK Simulator. Don’t worry, it’s ok, we’re here to help. Find out:

 

  • How to get started
  • How to create your first simulation
  • How to whitelist
  • How to understand reports
6 More Common Phishing Scams Your Employees Should Be Aware Of

6 More Common Phishing Scams Your Employees Should Be Aware Of

This article will walk you through 6 More Common Phishing Scams you and your employees should keep an eye out for in 2021. Phishing techniques have become more cunning, subtle, and more difficult to tell from the real deal. The bad guys never sleep, but neither...

14 Phishing Techniques Your Employees Need To Be Aware Of

14 Phishing Techniques Your Employees Need To Be Aware Of

The Internet is a wonderful place where you can find answers to almost anything, but nasty threats lurk in its dark corners, waiting for the perfect victim to "phish." Phishing techniques are becoming sneakier and more sophisticated as technology becomes more...

Quick guide to 6 common types of phishing

Quick guide to 6 common types of phishing

Phishing is a cybercrime that uses different tactics, such as deceptive emails, websites and text messages, in order to obtain users ‘personal information. Attackers use the obtained information for identify theft and fraud.   From phreaking to phishing The term...

How to install the ATTACK Simulator Outlook Add-in

How to install the ATTACK Simulator Outlook Add-in

Our plugin allows Outlook users to identify our phishing simulations or report suspicious email to system admins. Visit the Microsoft 365 Admin Center Go to Settings/Integrated apps and select Add-ins On the add-ins page, click Deploy Add-in During the Deploy wizard,...

How to install the ATTACK Simulator Gmail Plugin

How to install the ATTACK Simulator Gmail Plugin

Our plugin allows Gmail and GSuite users to identify our phishing simulations or report suspicious email to system admins. Open the Google Marketplace that you can find in your account Click the Domain Install button Select continue on the Domain install popup. Review...

No more “Son, how do I…?” Find your answers here

Computer security can be an intimidating subject. We prepared a few guides to get you started.

  • Introduction to Antivirus Solutions
  • Introduction to VPNs
  • Security when working from home
10 Best Anti-Phishing Practices You Need In Your Company

10 Best Anti-Phishing Practices You Need In Your Company

With the most recent figures painting a grim phishing landscape for both individuals and organizations, nobody wants to fall prey to such an attack. Phishing is lucrative and won’t be going anywhere anytime soon, but you’re in good hands. We’ve compiled a list of the...

4 Ways Scammers Use Phishing Techniques to Launch Ransomware Attacks

4 Ways Scammers Use Phishing Techniques to Launch Ransomware Attacks

Security experts agree that most ransomware attacks happen as a result of scammers using various phishing techniques. Usually, phishers steal account credentials - username and passwords - to compromise user accounts with the ultimate goal of financial gain. However,...

6 More Common Phishing Scams Your Employees Should Be Aware Of

6 More Common Phishing Scams Your Employees Should Be Aware Of

This article will walk you through 6 More Common Phishing Scams you and your employees should keep an eye out for in 2021. Phishing techniques have become more cunning, subtle, and more difficult to tell from the real deal. The bad guys never sleep, but neither...

Phishing Prevention: 8 Dead Giveaways That You’re Being Phished

Phishing Prevention: 8 Dead Giveaways That You’re Being Phished

Nowadays, it's no secret that bad guys love to go phishing and throw the bait to the most unsuspecting targets: your employees. In this article, we'll walk you through the 8 most common red flags of a phishing email to help you boost phishing prevention in your...

9 Identity Theft Signs & What To Do If You Became A Victim Of It

9 Identity Theft Signs & What To Do If You Became A Victim Of It

Do you suspect you've fallen victim to identity thieves? Then, check these 9 identity theft signs and recommendations in the unfortunate case you've been scammed. Identity theft is when someone pretends to be you after stealing your personal information and using it...