Mon, 25 Apr 2016 12:04
Imagine a compliance training scenario: you’re hearing a lot about a new phishing (a type of cyber crime involving fraudulent email) threat recently, so you decide to deliver training to protect your organisation; especially since your network was hacked last year, and you can’t risk suffering another data breach. So, you create or obtain some […]
Read More »