Introduction
Introduction Statistics Contact Development Disclaimer Help
Post AxPakpTXTWmHjl4PLM by [email protected]
More posts by [email protected]
Post #AxKD3m70ppO47MEdQ8 by [email protected]
0 likes, 2 repeats
There is no evidence that phishing simulations make your organization more secu…
Post #AxKPRnk5ckpjZdjhj6 by [email protected]
0 likes, 0 repeats
@malwarejake This is interesting to me. My org uses these all the time, but it …
Post #AxKPRnqTF1wBtQinfk by [email protected]
0 likes, 1 repeats
@guyjantic @malwarejake unpopular opinion: phishing simulations can be effectiv…
Post #AxPakpJc4Qq1EyQTs8 by [email protected]
0 likes, 0 repeats
@deepthoughts10 @guyjantic @malwarejake the research paper Understanding the Ef…
Post #AxPakpTXTWmHjl4PLM by [email protected]
0 likes, 0 repeats
@fcbsd @guyjantic @malwarejake that does sound bad. However, I don’t think mo…
Post #AxPakpaz1qjU6qYLwm by [email protected]
0 likes, 1 repeats
@deepthoughts10 @fcbsd @malwarejake As someone very much outside this bubble an…
Post #AxPapk8qjWSCdujgwK by [email protected]
0 likes, 1 repeats
@fcbsd @deepthoughts10 @malwarejake I saw that one. It's only one data poin…
Post #AxQl1pzS0ZH6xKhnRg by [email protected]
0 likes, 1 repeats
@guyjantic @fcbsd @deepthoughts10 The problem isn't that it's one data …
You are viewing proxied material from pleroma.anduin.net. The copyright of proxied material belongs to its original authors. Any comments or complaints in relation to proxied material should be directed to the original authors of the content concerned. Please see the disclaimer for more details.