{"id":10246,"date":"2022-04-20T12:25:36","date_gmt":"2022-04-20T12:25:36","guid":{"rendered":"https:\/\/cyber-fortified.com\/m\/?page_id=10246"},"modified":"2022-04-26T11:54:54","modified_gmt":"2022-04-26T11:54:54","slug":"phishing-awareness","status":"publish","type":"page","link":"https:\/\/cyber-fortified.com\/m\/phishing-awareness\/","title":{"rendered":"Phishing Awareness: Don&#8217;t Get Hooked In!"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"10246\" class=\"elementor elementor-10246\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9c11d19 elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"9c11d19\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-240b5c7 jltma-glass-effect-no\" data-id=\"240b5c7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-30ffd16 jltma-glass-effect-no elementor-widget elementor-widget-image\" data-id=\"30ffd16\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1100\" height=\"500\" src=\"https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2021\/03\/fortified-phishing.jpg\" class=\"attachment-full size-full wp-image-9711\" alt=\"\" srcset=\"https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2021\/03\/fortified-phishing.jpg 1100w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2021\/03\/fortified-phishing-300x136.jpg 300w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2021\/03\/fortified-phishing-1024x465.jpg 1024w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2021\/03\/fortified-phishing-768x349.jpg 768w\" sizes=\"(max-width: 1100px) 100vw, 1100px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2d8960e elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"2d8960e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-74660e7 jltma-glass-effect-no\" data-id=\"74660e7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f4d57e1 jltma-glass-effect-no elementor-widget elementor-widget-heading\" data-id=\"f4d57e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-large\">Phishing Awareness: Don't Get Hooked In!<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35e6a5c elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"35e6a5c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-da758fd jltma-glass-effect-no\" data-id=\"da758fd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c432f1f jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"c432f1f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Overview<\/strong><\/p><p>With the increasing threat of cyber-attacks and data breaches, phishing attacks and cyber security go hand in hand. Such is the threat of phishing attacks; businesses are needing to do more to help defend against such attacks.<\/p><p>This course looks at the anatomy of phishing email campaigns and dissects the fundamental components. Delegates will be armed with the necessary skills to combat phishing attacks within their organisations, not just the theory.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d7370a9 elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"d7370a9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6c2f1f0 jltma-glass-effect-no\" data-id=\"6c2f1f0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ab29db5 jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"ab29db5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Course Objectives<\/strong><\/p><ul><li>Understanding what social engineering is and its relation to phishing attacks<\/li><li>Key identifies in a phishing attack<\/li><li>Consequences of a successful phishing attack<\/li><li>How victims are often tricked by to a phishing attack<\/li><li>How phishing attacks planned and executed<\/li><li>Essential steps to mitigate the risks of phishing scams<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-45ccc0c elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"45ccc0c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-8591fa0 jltma-glass-effect-no\" data-id=\"8591fa0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9c2f37b jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"9c2f37b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Course Content<\/strong><\/p><ul><li>Defining Phishing<\/li><li>Types of Phishing Attacks<\/li><li>The Reality of Phishing Attacks<\/li><li>Case Studies<\/li><li>Anatomy of a Phishing Attack<\/li><li>Causes of a Phishing Attack<\/li><li>How to Protect your Business<\/li><li>Interactive Sessions<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-f175110 jltma-glass-effect-no\" data-id=\"f175110\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1df9ded jltma-glass-effect-no elementor-widget elementor-widget-image\" data-id=\"1df9ded\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"720\" height=\"314\" src=\"https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2021\/05\/phishing-attack-1024x446.jpg\" class=\"attachment-large size-large wp-image-9734\" alt=\"\" srcset=\"https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2021\/05\/phishing-attack-1024x446.jpg 1024w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2021\/05\/phishing-attack-300x131.jpg 300w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2021\/05\/phishing-attack-768x334.jpg 768w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2021\/05\/phishing-attack.jpg 1204w\" sizes=\"(max-width: 720px) 100vw, 720px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f3d8276 elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"f3d8276\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cc84e66 jltma-glass-effect-no\" data-id=\"cc84e66\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b02f586 jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"b02f586\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Who is this coursed aimed at?<\/strong><\/p><p>The course is aimed at the SME sector and is suitable across multiple industries. In particular, those within the financial, legal, retail and hospitality industries.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7a96b77 elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"7a96b77\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-83184a7 jltma-glass-effect-no\" data-id=\"83184a7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d911972 jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"d911972\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Next Steps<\/strong><\/p><p>Learn how our courses can help your business build your employees into a strong first line of defence.<\/p><p>Get in touch with us, today, to book your complimentary scoping call with our training team.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-07206f4 elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"07206f4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a199558 jltma-glass-effect-no\" data-id=\"a199558\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e2fd164 jltma-glass-effect-no elementor-widget elementor-widget-html\" data-id=\"e2fd164\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<!-- Calendly inline widget begin -->\n<div class=\"calendly-inline-widget\" data-url=\"https:\/\/calendly.com\/cyberfortified\/scoping-call-training?hide_gdpr_banner=1\" style=\"min-width:320px;height:700px;\"><\/div>\n<script type=\"text\/javascript\" src=\"https:\/\/assets.calendly.com\/assets\/external\/widget.js\" async><\/script>\n<!-- Calendly inline widget end -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Phishing Awareness: Don&#8217;t Get Hooked In! Overview With the increasing threat of cyber-attacks and data breaches, phishing attacks and cyber security go hand in hand. Such is the threat of phishing attacks; businesses are needing to do more to help defend against such attacks. This course looks at the anatomy of phishing email campaigns and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-10246","page","type-page","status-publish","hentry","post"],"_links":{"self":[{"href":"https:\/\/cyber-fortified.com\/m\/wp-json\/wp\/v2\/pages\/10246","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyber-fortified.com\/m\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyber-fortified.com\/m\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyber-fortified.com\/m\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyber-fortified.com\/m\/wp-json\/wp\/v2\/comments?post=10246"}],"version-history":[{"count":18,"href":"https:\/\/cyber-fortified.com\/m\/wp-json\/wp\/v2\/pages\/10246\/revisions"}],"predecessor-version":[{"id":10647,"href":"https:\/\/cyber-fortified.com\/m\/wp-json\/wp\/v2\/pages\/10246\/revisions\/10647"}],"wp:attachment":[{"href":"https:\/\/cyber-fortified.com\/m\/wp-json\/wp\/v2\/media?parent=10246"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}