Cybersecurity: Phishing and Smishing
Try it for free!
We respect your privacy and won’t share your information with outside parties. View our privacy statement.
At a glance
Cyber criminals are often able to successfully hack an organization by employing sophisticated schemes to trick employees into giving them access to organizational data. This micro learning focuses on two of the most common ways they do this: phishing and smishing. It explains what these schemes look like and offers best practices for avoiding, identifying and reporting them.