{"id":9709,"date":"2021-03-30T18:33:49","date_gmt":"2021-03-30T18:33:49","guid":{"rendered":"https:\/\/cyber-fortified.com\/m\/?page_id=9709"},"modified":"2022-04-25T15:23:30","modified_gmt":"2022-04-25T15:23:30","slug":"fortified-phishing","status":"publish","type":"page","link":"https:\/\/cyber-fortified.com\/m\/fortified-phishing\/","title":{"rendered":"Fortified Phishing\u2122"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"9709\" class=\"elementor elementor-9709\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-40b6362 elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"40b6362\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d73dbce jltma-glass-effect-no\" data-id=\"d73dbce\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0ff300b jltma-glass-effect-no elementor-widget elementor-widget-image\" data-id=\"0ff300b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/elementor\/thumbs\/fortified-phishing-p4zllazv7zb546mipfxxbgad5pp057f3dtvqujxzt4.jpg\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d4dd111 elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"d4dd111\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2ed78ed jltma-glass-effect-no\" data-id=\"2ed78ed\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d456145 jltma-glass-effect-no elementor-widget elementor-widget-heading\" data-id=\"d456145\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Fortified Phishing\u2122<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-4d418f6 jltma-glass-effect-no\" data-id=\"4d418f6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cb5192a elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"cb5192a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2641bd4 jltma-glass-effect-no\" data-id=\"2641bd4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-668cd11 jltma-glass-effect-no elementor-widget elementor-widget-heading\" data-id=\"668cd11\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-large\">Are your employees prepared for a Phishing Attack?<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2d4ba18 elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"2d4ba18\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-98dfa19 jltma-glass-effect-no\" data-id=\"98dfa19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7a4059a jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"7a4059a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>What is Fortified Phishing\u2122?<\/strong><\/p><p>Fortified Phishing\u2122 enables you to evaluate employees\u2019<br \/>security awareness.<\/p><p>It simulates phishing campaigns and detects easy clickers that can place your organisation at risk. Increasing their awareness and vigilance will reduce your cyber exposure and help you to prevent data breaches, minimise malware-related downtime, and avoid crippling incident costs.<\/p><p><strong>Why use Fortified Phishing\u2122?<\/strong><\/p><div>Our Fortified Phishing\u2122 platform simulates real-life phishing campaigns in which employees might click on and fall victim to within your organization.<\/div><div>\u00a0<\/div><div>The continuous feedback given from the simulated tests will help focus on employees that require more education and monitoring than others.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-051da1d jltma-glass-effect-no\" data-id=\"051da1d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-98f965c jltma-glass-effect-no\" data-id=\"98f965c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8a5e7aa jltma-glass-effect-no elementor-widget elementor-widget-image\" data-id=\"8a5e7aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1537\" height=\"2163\" src=\"https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2021\/03\/phishing-attacks-1.png\" class=\"attachment-full size-full wp-image-9712\" alt=\"Fortified Phishing\u2122\" srcset=\"https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2021\/03\/phishing-attacks-1.png 1537w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2021\/03\/phishing-attacks-1-213x300.png 213w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2021\/03\/phishing-attacks-1-728x1024.png 728w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2021\/03\/phishing-attacks-1-768x1081.png 768w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2021\/03\/phishing-attacks-1-1091x1536.png 1091w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2021\/03\/phishing-attacks-1-1455x2048.png 1455w\" sizes=\"(max-width: 1537px) 100vw, 1537px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-aca8cc9 elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"aca8cc9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-844a8d5 jltma-glass-effect-no\" data-id=\"844a8d5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-94e7828 jltma-glass-effect-no\" data-id=\"94e7828\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0fde151 elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"0fde151\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-330569a jltma-glass-effect-no\" data-id=\"330569a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-45fa80f jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"45fa80f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>What is a Phishing Attack?<\/strong><\/p><p>Phishing is a cyber attack that uses disguised email as a weapon.<\/p><p>Phishing attacks use social engineering to mimic trusted entities and increase the likelihood of the recipient to act, such as clicking on a malicious attachment or link and unwittingly enter sensitive information such as a password or bank account details.<\/p><p>A successful phishing attack enables cyber criminals to infiltrate and compromise business networks.<\/p><p><strong>What a Phishing Attack Looks Like:<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f03f099 jltma-glass-effect-no elementor-widget elementor-widget-image\" data-id=\"f03f099\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"720\" height=\"375\" src=\"https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2021\/03\/phishing-1024x534.png\" class=\"attachment-large size-large wp-image-9716\" alt=\"\" srcset=\"https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2021\/03\/phishing-1024x534.png 1024w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2021\/03\/phishing-300x156.png 300w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2021\/03\/phishing-768x401.png 768w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2021\/03\/phishing-1536x801.png 1536w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2021\/03\/phishing-2048x1068.png 2048w\" sizes=\"(max-width: 720px) 100vw, 720px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-078c191 elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"078c191\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-72b3171 jltma-glass-effect-no\" data-id=\"72b3171\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3d69a29 jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"3d69a29\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<strong>Key Features<\/strong>\n<ul><br>\n \t\n \t<li>Phishing emails are sent from the Fortified Phishing\u2122\u2019s cloud platform to a list of emails the customer chooses.<\/li><br>\n<li>None of the emails contain real malicious content\n(ransomware, URLs, worms, etc.).<\/li><br>\n \t<li>Events are tracked and updated by the Fortified Phishing\u2122 platform, throughout the campaign.<\/li><br>\n \t<li>Fortified Phishing\u2122 utilises a range of email templates, attachments, and login pages, to create a range of sophisticated attacks to test your organisation&#8217;s preparedness and resilience to a phishing attack.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-5668e63 jltma-glass-effect-no\" data-id=\"5668e63\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9991a85 jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"9991a85\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Actionable Insights<\/strong><\/p><p>Each step in the campaign is tracked (e.g. when an email is opened, and a link is clicked) to provide your organisation with the full picture of your employees\u2019 security awareness levels and focus on employees that require more education and monitoring than others.<\/p><p><img decoding=\"async\" class=\"aligncenter wp-image-9717 size-full\" src=\"https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2021\/03\/actionable-insights.jpg\" alt=\"Actionable Insights\" width=\"1100\" height=\"500\" srcset=\"https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2021\/03\/actionable-insights.jpg 1100w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2021\/03\/actionable-insights-300x136.jpg 300w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2021\/03\/actionable-insights-1024x465.jpg 1024w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2021\/03\/actionable-insights-768x349.jpg 768w\" sizes=\"(max-width: 1100px) 100vw, 1100px\" \/><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8962407 elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"8962407\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-11c8b8d jltma-glass-effect-no\" data-id=\"11c8b8d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-24d24ba jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"24d24ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Next Steps<\/strong><\/p><p>We always recommend a scoping call to discuss the company, your current security posture and the options to choose from.<\/p><p><span style=\"text-decoration: underline;\">Please use the booking calendar, below, to schedule your scoping call:<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-78b0bd1 elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"78b0bd1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9f7127a jltma-glass-effect-no\" data-id=\"9f7127a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6e2c80f jltma-glass-effect-no elementor-widget elementor-widget-html\" data-id=\"6e2c80f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<!-- Calendly inline widget begin -->\n<div class=\"calendly-inline-widget\" data-url=\"https:\/\/calendly.com\/cyberfortified\/scoping-call-cyber-security-solutions?hide_gdpr_banner=1\" style=\"min-width:320px;height:700px;\"><\/div>\n<script type=\"text\/javascript\" src=\"https:\/\/assets.calendly.com\/assets\/external\/widget.js\" async><\/script>\n<!-- Calendly inline widget end -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Fortified Phishing\u2122 Are your employees prepared for a Phishing Attack? What is Fortified Phishing\u2122? Fortified Phishing\u2122 enables you to evaluate employees\u2019security awareness. It simulates phishing campaigns and detects easy clickers that can place your organisation at risk. Increasing their awareness and vigilance will reduce your cyber exposure and help you to prevent data breaches, minimise [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-9709","page","type-page","status-publish","hentry","post"],"_links":{"self":[{"href":"https:\/\/cyber-fortified.com\/m\/wp-json\/wp\/v2\/pages\/9709","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyber-fortified.com\/m\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyber-fortified.com\/m\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyber-fortified.com\/m\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyber-fortified.com\/m\/wp-json\/wp\/v2\/comments?post=9709"}],"version-history":[{"count":29,"href":"https:\/\/cyber-fortified.com\/m\/wp-json\/wp\/v2\/pages\/9709\/revisions"}],"predecessor-version":[{"id":10570,"href":"https:\/\/cyber-fortified.com\/m\/wp-json\/wp\/v2\/pages\/9709\/revisions\/10570"}],"wp:attachment":[{"href":"https:\/\/cyber-fortified.com\/m\/wp-json\/wp\/v2\/media?parent=9709"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}