PhishingBox's training emails contain security tips with animated content that can be sent to employees or staff as part of an ongoing security awareness training program. These emails, unlike security awareness training courses, do not require any formal interaction with the end user. The security tip emails are intended to provide ongoing security reminders to employees and staff. By design, the security tip training emails do not contain any links or features that could be construed as suspicious.

Training Email

Adware Beware

Some adware may be fine and help serve more tailored ads, but it's the malicious type we'll be exploring.

Training Email

AirDrop & Bluetooth Connectivity

You should only turn these features on when actively using them.

Training Email

Anti-virus & Anti-malware Defense

Adding walls of defense mitigates the likelihood you'll suffer from a cyberattack.

Training Email

Authentication System Security

There are some aspects of security that are controlled by the user that can improve or maintain the security of the authentication system.

Training Email

Avoid Unintentional Data Exposure

Many data breaches are not caused by hackers, but by the unintentional exposure of confidential information by employees.

Training Email

Basic Email Security

Email security should be a top priority for all companies. From schools to startups, email is the backbone of many organizations. It's also one of the most common methods for attackers to break into a network.

Training Email

Be Cybersmart

When it comes to information security, you play a big role in your organization's security. The following steps are key to helping your organization stay secure.

Training Email

Beat Back the Bad Bots

Bots, as a whole, account for close to 60% of all web traffic.

Training Email

Benefits of Single Sign On (SSO) & Password Lockers

It isn't easy to remember different passwords for different applications and devices. But there's help!

Training Email

Charging Port Safety

Public community gathering points like airports, hotels, and restaurants are hotbeds for cybercrime.

Training Email

Control of Printed Material with Sensitive Information

Credential and data theft doesn’t stop with digital attacks.

Training Email

Don't Trust the Caller ID

Phone numbers can be easily masked, do not trust caller ID on your phone.

Training Email

Encryption Defense

Keep your data and information secure from prying eyes.

Training Email

Financial Requests Receive Extra Attention

If there's going to be an exchange of money, make sure everything adds up.

Training Email

Five Steps for Secure Communication

Caution is the best policy.

Training Email

How to Handle Sensitive Information

Some of the information we access on a daily basis is sensitive and should be handled appropriately.

Training Email

How to Spot & Avoid Phishing

Not even the best scammer can outsmart skepticism.

Training Email

Identifying & Reporting Security Events

A security incident is an event that threatens the security of our information systems. This includes the transmission, storage, and retrieval of information with third parties.

Training Email

Incident Response

How to develop a plan you can stick to and what should be included.

Training Email

Insider Attacks

Your most dangerous corporate threat could be an internal one.

Training Email

Is This Email Legitimate

Five questions to ask yourself.

Training Email

Limit Ransomware Risk

Ransomware can be devastating to an organization by limiting access to systems and information.

Training Email

Lock Your Computer

Even if you're coming right back, grabbing something from the printer, running to the restroom, or throwing something away, keeping your computer secure is crucial.

Training Email

MFA Push Notification Exploitation

Routine & Fatigue: An IT administrator's worst nightmares.

Training Email

One Size Does Not Fit All

A password, by definition, is a secret word or phrase used to gain access to something... not everything!

Training Email

Password Management

In today's environment, there are an increasing number of web-based systems. As such, it is likely that you have multiple usernames and passwords to remember.

Training Email

Public Wi-Fi Tips

Private data should not be accessed or shared over open networks.

Training Email

Put Papers Away

Stop leaving passwords on Post-It notes in plain sight, for starters.

Training Email

Request Does Not Equal Response

If you get a request for ANYTHING, don't respond to it until it can be verified.

Training Email

Secure Authentication Practices

Keep unauthorized access at bay and sensitive information locked away.

Training Email

Shadow IT

Shadow IT is defined as using systems, software, devices, applications, or technology services without formal approval from an organization's technology department.

Training Email

Shred It & Forget It

Protect and dispose of sensitive information and printed documents properly.

Training Email

Smishing

Scammers aren't afraid to send you a text.

Training Email

Spear Phishing

Personalized phishing attempts curated just for you by the bad guys.

Training Email

The Power of Updating

Keep your hardware and software updated to stay as safe as possible.

Training Email

The True Cost of Ransomware

The financial impact can go well beyond the initial attack.

Training Email

Train & Retain

Cybersecurity includes the human element.

Training Email

Types of Phishing

From your email inbox to phone calls, texts, and everywhere in between, scammers have developed clever ways to steal and wreak havoc.

Training Email

Vishing

Scammers who attempt their malicious acts via phone call will try to catch you unsuspectingly. We'll help get you prepared to spot a scam call.

Training Email

VPN

A network connection point which hosts your team and resources. It is secure, requiring 2-factor-authentication (2FA) or multi-factor-authentication (MFA) and data encryption so only those with lawful access can see the content.

Training Email

Whaling

Look out CEOs, executive teams, and upper management trying to impress the board or the boss, this one's for you.

Training Email

What Happens When You're Hacked

How to spot a hacking attempt and identify if you've been compromised.

Training Email

What If I Clicked a Bad Link or Attachment?

We all make mistakes. We’re here to help you know what to do when you slip up.

Training Email

What is Ransomware?

Ransomware is a type of malware that encrypts files on a computer where the attacker provides a method for the victim to pay to unlock the files, hence the name.

Training Email

Why Data Backups are Important

Preparing for the worst is necessary for information security.

Training Email

Removable Media

Receive or stumble upon a Universal Serial Bus (USB) drive, flash drive, external hard drive, compact disc (CD), DVD, SD card, floppy disk (just checking to make sure you’re still paying attention!)?

Training Email

Wikipedia Links

Cybercriminals are hijacking Wikipedia pages to distribute nefarious links.

Training Email

HTTPS Protocol Abuse

Many users have come to expect HTTPS to be safe and secure. Seeing a padlock icon has equated to moving freely on a site and even providing private information or payment details worry free.

Training Email

AI Cybercrime Tools

AI-powered tools provide cybercriminals with a wealth of resources and opportunity.

Training Email

The Big Event

Popular events are prime targets for cybercrime.

Training Email

QR Code Safety

Cybercriminals deploy malicious QR codes physically and digitally.

Training Email

Callback Phishing

Increasing threat impact with delayed action tactics.

Training Email

Swatting

Prank phone calls with malicious goals.

Training Email

SMTP Smuggling

How cybercriminals evade email filter protection.

Training Email

MSP Security

Cybersecurity starts with Managed Service Provider guardians.

Training Email

Cloud Security

What threatens off-site data storage?

Training Email

Human Risk Management

The evolution of security awareness training.

Training Email

Defense Layers

A multi-faceted approach to cybersecurity is necessary for proper protection.

Training Email

Adversary in The Middle (AiTM) Attacks

Exploiting the gaps in your cybersecurity defenses.

Training Email

Insider Threats: What to Watch For

Staying aware internally is just as important as being on your guard externally.

Training Email

The Rise of Generative AI

While GenAI has potential applications in various fields, including cybersecurity, its impact on actual attacks has been limited so far.