Manage training campaigns and track effectiveness
Sarah Chen
sarah.chen@company.com
Michael Torres
m.torres@company.com
Lisa Anderson
l.anderson@company.com
Spotting Phishing Emails
Trigger: General Awareness
Fake Login Pages 101
Trigger: Credential Entry
URL Tricks and Typosquatting
Trigger: Typosquatting Detection
OAuth and App Permissions
Trigger: Risky OAuth Consent
Reporting Suspicious Activity
Trigger: General Awareness
Business Email Compromise (BEC)
Trigger: BEC Detection
Social Engineering Tactics
Trigger: Social Engineering
ClickFix and Fake CAPTCHAs
Trigger: ClickFix Attack
Session Hijacking and Token Theft
Trigger: Session Theft Detection
Recognizing AI-Generated Phishing
Trigger: AI Phishing
Browser Extension Risks
Trigger: Extension Installation
Shadow SaaS and Data Leakage
Trigger: Shadow SaaS Detection
Mobile Phishing (Smishing)
Trigger: Mobile Threat
QR Code Phishing (Quishing)
Trigger: QR Code Scan
Password Security Best Practices
Trigger: Weak Password Detection
Executive Protection: Spear Phishing
Trigger: Executive Target
Finance Team: Invoice Fraud
Trigger: Invoice Manipulation
IT Admin: Privileged Account Security
Trigger: Privileged Access
Sales Team: LinkedIn Impersonation
Trigger: Social Media Phishing
HR: Fake Job Applications
Trigger: Resume Phishing