Phishing

Watch the video from our Phishing course, where Nina was so eager to catch the latest episode of Game of thrones that she gets scammed by a phishing email.

You can access the entire course on our e-learning platform by logging in here.
If you do not have an account, you can try it for free.

The course

About the course

This course will give you a better understanding of what phishing is and how all individuals and organisations can be affected by it. Additionally, we provide some tips on how to recognise phishing attacks. With these tips, you and your team will be better equipped to avoid phishing attacks.

Phishing

Want to learn more?

Phishing has been estimated to be the biggest current cyber security threat to organisations. This blog post will discuss what phishing is and why they are getting harder and harder to spot. We also give you tips on how to train your team, so that they do not fall victim to phishing schemes.  

Want to learn more?

Phishing has been estimated to be the biggest current cyber security threat to organisations. This blog post will discuss what phishing is and why they are getting harder and harder to spot. We also give you tips on how to train your team, so that they do not fall victim to phishing schemes.  

Phishing

Other material

Create awareness in your organisation with our posters. You can download the posters and hang them on your walls in your organisation.

In this way your employees willl be reminded of what to be aware of when they see a the posters.

cp poster

Related courses

Phone Scamming
Category: Cyber security

Phone Scamming

Learning objectives: how phone scams work, which red flags you should be aware of, and how to best handle unexpected phone calls.

Read More »
Processing personal data

Processing personal data

Learning objectives: What processing means in relation to personal data, when exactly you process data and what it means to grant other people access to personal data

Read More »
Top

Contact us

You are always welcome to contact us
for an initial and informal chat about your cyber security challenges.