{"id":16281,"date":"2024-03-05T03:21:08","date_gmt":"2024-03-05T02:21:08","guid":{"rendered":"https:\/\/ig.technology\/?page_id=16281"},"modified":"2025-02-28T05:12:15","modified_gmt":"2025-02-28T04:12:15","slug":"phishingbox","status":"publish","type":"page","link":"https:\/\/ig.technology\/index.php\/phishingbox\/","title":{"rendered":"PhishingBox"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"16281\" class=\"elementor elementor-16281\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-514f1a3 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-parent\" data-id=\"514f1a3\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a66ca52 elementor-widget elementor-widget-spacer\" data-id=\"a66ca52\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9c5ae6e elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"9c5ae6e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-4037edb\" data-id=\"4037edb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0d2a5c0 elementor-widget elementor-widget-image\" data-id=\"0d2a5c0\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"640\" height=\"640\" src=\"https:\/\/ig.technology\/wp-content\/uploads\/2024\/03\/correo-electronico.gif\" class=\"attachment-large size-large wp-image-16283\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-1481f47\" data-id=\"1481f47\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5b8f616 elementor-widget elementor-widget-heading\" data-id=\"5b8f616\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Phishing Simulation &amp; Awareness Training<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a3cc980 elementor-widget elementor-widget-text-editor\" data-id=\"a3cc980\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul><li>Simulated impersonation with security awareness training.<\/li><li>All employees are required to receive security training. We provide in-house security courses along with courses from our third-party content providers. These courses range from general information security to specific classes on phishing, social engineering and more.<\/li><li>These courses are available in multiple languages.<\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c69e65c elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-eael-creative-button\" data-id=\"c69e65c\" data-element_type=\"widget\" data-widget_type=\"eael-creative-button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t        <div class=\"eael-creative-button-wrapper\">\n\n            <a class=\"eael-creative-button eael-creative-button--default eael-cb-icon-position-\" href=\"https:\/\/ig.technology\/wp-content\/uploads\/2024\/03\/Phishingbox-One-pager-Blue-ENGLISH.pdf\" data-text=\"Go!\">\n            \t    \n                <div class=\"creative-button-inner\">\n\n                    \n                    <span class=\"cretive-button-text\">English Flyer<\/span>\n\n                                    <\/div>\n\t                        <\/a>\n        <\/div>\n        \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-53a4bc7 elementor-widget__width-auto elementor-widget-mobile__width-inherit elementor-widget elementor-widget-eael-creative-button\" data-id=\"53a4bc7\" data-element_type=\"widget\" data-widget_type=\"eael-creative-button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t        <div class=\"eael-creative-button-wrapper\">\n\n            <a class=\"eael-creative-button eael-creative-button--default eael-cb-icon-position-\" href=\"https:\/\/ig.technology\/wp-content\/uploads\/2024\/03\/Phishingbox-Descripcion-General-SPANISH.pdf\" data-text=\"Go!\">\n            \t    \n                <div class=\"creative-button-inner\">\n\n                    \n                    <span class=\"cretive-button-text\">Spanish Flyer<\/span>\n\n                                    <\/div>\n\t                        <\/a>\n        <\/div>\n        \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-30ca1690 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-parent\" data-id=\"30ca1690\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1d892f14 animated-slow elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"1d892f14\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;slideInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Platform Ecosystem\n<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3d9a04c7 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-child\" data-id=\"3d9a04c7\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-a6e47bf animated-slow e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no elementor-invisible e-con e-child\" data-id=\"a6e47bf\" data-element_type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:150}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-472caf5 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"472caf5\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"flaticoninfetech- flaticon-infetech-shield\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7312212 elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"7312212\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Cybersecurity Training<\/h3><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e65fad elementor-widget elementor-widget-text-editor\" data-id=\"5e65fad\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"card-sub-ttl w3_bg\"><div class=\"elementor-element elementor-element-98de9dd mobile-text-center elementor-widget elementor-widget-text-editor\" data-id=\"98de9dd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><div class=\"mb-4\"><p>Phishing testing and other cybersecurity training is a continuous process of testing and remediation training. With the PhishingBox platform, organizations can implement a comprehensive human risk management program using the products listed on this page. PhishingBox provides a suite of security tools to implement a human risk management program\u00a0<\/p><\/div><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dd5610a animated-slow e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no elementor-invisible e-con e-child\" data-id=\"dd5610a\" data-element_type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:150}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-60ccf8f elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"60ccf8f\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"flaticon flaticon-cloud-computing\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-55d8e552 elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"55d8e552\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Phishing Simulations<\/h3><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-28894932 elementor-widget elementor-widget-text-editor\" data-id=\"28894932\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"card-sub-ttl w3_bg\"><div class=\"elementor-element elementor-element-0b9d6bf mobile-text-center elementor-widget elementor-widget-text-editor\" data-id=\"0b9d6bf\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><div class=\"mb-4\"><p>Through the phishing simulator, organizations can conduct realistic phishing tests to evaluate the effectiveness of their employees&#8217; security awareness. Our phishing simulator is robust and allows for complex testing schedules, a dynamic template library, editing of templates, and more.<\/p><\/div><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1c2d0d1 animated-slow e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no elementor-invisible e-con e-child\" data-id=\"1c2d0d1\" data-element_type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:150}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-995278e elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"995278e\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"flaticoninfetech- flaticon-infetech-cloud-computing\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e41690c elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"e41690c\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">KillPhish\u2122 Scan & Report<\/h3><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-98ce9fc elementor-widget elementor-widget-text-editor\" data-id=\"98ce9fc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"card-sub-ttl w3_bg\"><div class=\"elementor-element elementor-element-83aa4cd mobile-text-center elementor-widget elementor-widget-text-editor\" data-id=\"83aa4cd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><div class=\"mb-4\"><div class=\"mb-4\"><p>KillPhish\u2122 is an email plugin to help users evaluate emails and report suspicious emails to an organization\u2019s security operations. Any reported simulated phishing emails improve an organization\u2019s Net Reporter Score or NRS. The scanning capabilities of KillPhish\u2122 provide indications to employees of potential threats from suspicious emails.<\/p><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d8ab45c e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-parent\" data-id=\"d8ab45c\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f027786 elementor-widget elementor-widget-spacer\" data-id=\"f027786\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3021fbf e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-parent\" data-id=\"3021fbf\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-df75eb2 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-child\" data-id=\"df75eb2\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-57f1488 elementor-widget elementor-widget-image\" data-id=\"57f1488\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.phishingbox.com\/themes\/phishingbox\/assets\/img\/logo@2x.webp\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-692226f e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-parent\" data-id=\"692226f\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-66d9d0d elementor-widget elementor-widget-spacer\" data-id=\"66d9d0d\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f4e670a e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-parent\" data-id=\"f4e670a\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-4b8eb98 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-child\" data-id=\"4b8eb98\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2fbc820 elementor-widget elementor-widget-heading\" data-id=\"2fbc820\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Spanish Video<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0ffb221 elementor-widget elementor-widget-video\" data-id=\"0ffb221\" data-element_type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/zL86MDmhybk&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4f09077 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-child\" data-id=\"4f09077\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ecc5097 elementor-widget elementor-widget-heading\" data-id=\"ecc5097\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">English Video<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a88ed91 elementor-widget elementor-widget-video\" data-id=\"a88ed91\" data-element_type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/uIm2iKslFgw&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-becd34f e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-parent\" data-id=\"becd34f\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e4ce8b2 elementor-widget elementor-widget-spacer\" data-id=\"e4ce8b2\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e8dcb9b e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-parent\" data-id=\"e8dcb9b\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5f29171 elementor-widget elementor-widget-heading\" data-id=\"5f29171\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Phishing Facts<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-da26583 elementor-widget elementor-widget-heading\" data-id=\"da26583\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Information security statistics that every company should know.<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-125c383 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"125c383\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-8788cce animated-fast elementor-invisible\" data-id=\"8788cce\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;ova-move-up&quot;,&quot;animation_tablet&quot;:&quot;none&quot;,&quot;animation_delay&quot;:150}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9ac4b60 elementor-widget elementor-widget-infetech_elementor_service\" data-id=\"9ac4b60\" data-element_type=\"widget\" data-widget_type=\"infetech_elementor_service.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t           \n           \t\n\t            <div class=\"ova-service ova-service-template1\">\n\n\t            \t<div class=\"image-service\">\n\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/marketplace.canva.com\/565Vg\/MADwza565Vg\/1\/tl\/canva-MADwza565Vg.jpg\" alt=\"35% of ransomware attacks are delivered via email.\n\n\">\n                    <\/div>\n\n                    <div class=\"content-service-wrapper\">\n                    \t\t\t\t            \t<div class=\"icon\">\n\t\t\t            \t\t<i aria-hidden=\"true\" class=\"flaticon flaticon-analytics\"><\/i>\t\t\t            \t<\/div>\n\t\t\t          \t\t\t\t          \t\n                    \t<div class=\"content-service\">\n\t\t\t\t            \t\t\t\t\t            \t\t\t\t\t\t\t\t\t<h4 class=\"title\">\n\t\t\t\t\t\t\t\t\t\t35% of ransomware attacks are delivered via email.\n\n\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                    <\/div> \n                    <\/div>\n\n\t\t\t    <\/div>\n\n\t\t \t\t\t \t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-ede5845 animated-fast elementor-invisible\" data-id=\"ede5845\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;ova-move-up&quot;,&quot;animation_tablet&quot;:&quot;none&quot;,&quot;animation_delay&quot;:100}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1c28abc elementor-widget elementor-widget-infetech_elementor_service\" data-id=\"1c28abc\" data-element_type=\"widget\" data-widget_type=\"infetech_elementor_service.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t           \n           \t\n\t            <div class=\"ova-service ova-service-template1\">\n\n\t            \t<div class=\"image-service\">\n\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/marketplace.canva.com\/MADAX2UyGz0\/1\/thumbnail_large-1\/canva-MADAX2UyGz0.jpg\" alt=\"74% of all security breaches involve the human element.\">\n                    <\/div>\n\n                    <div class=\"content-service-wrapper\">\n                    \t\t\t\t            \t<div class=\"icon\">\n\t\t\t            \t\t<i aria-hidden=\"true\" class=\"flaticon flaticon-cloud-computing-1\"><\/i>\t\t\t            \t<\/div>\n\t\t\t          \t\t\t\t          \t\n                    \t<div class=\"content-service\">\n\t\t\t\t            \t\t\t\t\t            \t\t\t\t\t\t\t\t\t<h4 class=\"title\">\n\t\t\t\t\t\t\t\t\t\t74% of all security breaches involve the human element.\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                    <\/div> \n                    <\/div>\n\n\t\t\t    <\/div>\n\n\t\t \t\t\t \t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-31773e5 animated-fast elementor-invisible\" data-id=\"31773e5\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;ova-move-up&quot;,&quot;animation_tablet&quot;:&quot;none&quot;,&quot;animation_delay&quot;:200}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1f324f6 elementor-widget elementor-widget-infetech_elementor_service\" data-id=\"1f324f6\" data-element_type=\"widget\" data-widget_type=\"infetech_elementor_service.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t           \n           \t\n\t            <div class=\"ova-service ova-service-template1\">\n\n\t            \t<div class=\"image-service\">\n\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/marketplace.canva.com\/G2Kpo\/MAFlLqG2Kpo\/1\/tl\/canva-MAFlLqG2Kpo.jpg\" alt=\"95% of social engineering attack motivation is financially driven.\">\n                    <\/div>\n\n                    <div class=\"content-service-wrapper\">\n                    \t\t\t\t            \t<div class=\"icon\">\n\t\t\t            \t\t<i aria-hidden=\"true\" class=\"flaticon flaticon-cyber\"><\/i>\t\t\t            \t<\/div>\n\t\t\t          \t\t\t\t          \t\n                    \t<div class=\"content-service\">\n\t\t\t\t            \t\t\t\t\t            \t\t\t\t\t\t\t\t\t<h4 class=\"title\">\n\t\t\t\t\t\t\t\t\t\t95% of social engineering attack motivation is financially driven.\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                    <\/div> \n                    <\/div>\n\n\t\t\t    <\/div>\n\n\t\t \t\t\t \t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-4ad59fe e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-parent\" data-id=\"4ad59fe\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b5dea1c elementor-align-center elementor-widget elementor-widget-button\" data-id=\"b5dea1c\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-xl\" href=\"https:\/\/www.phishingbox.com\/phishing-iq-test\/quiz.php?reset=1\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Take a Test<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ef2198 elementor-widget elementor-widget-spacer\" data-id=\"1ef2198\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-89bc5a6 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-parent\" data-id=\"89bc5a6\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c059b34 elementor-widget elementor-widget-spacer\" data-id=\"c059b34\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3a4f260 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-parent\" data-id=\"3a4f260\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cae7841 elementor-widget elementor-widget-spacer\" data-id=\"cae7841\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Phishing Simulation &#038; Awareness Training Simulated impersonation with security awareness training. All employees are required to receive security training. We provide in-house security courses along with courses from our third-party content providers. These courses range from general information security to specific classes on phishing, social engineering and more. These courses are available in multiple languages. English Flyer Spanish Flyer Platform Ecosystem Cybersecurity Training Phishing testing and other cybersecurity training is a continuous process of testing and remediation training. With the PhishingBox platform, organizations can implement a comprehensive human risk management program using the products listed on this page. PhishingBox provides a suite of security tools to implement a human risk management program\u00a0 Phishing Simulations Through the phishing simulator, organizations can conduct realistic phishing tests to evaluate the effectiveness of their employees&#8217; security awareness. Our phishing simulator is robust and allows for complex testing schedules, a dynamic template library, editing of templates, and more. KillPhish\u2122 Scan &#038; Report KillPhish\u2122 is an email plugin to help users evaluate emails and report suspicious emails to an organization\u2019s security operations. Any reported simulated phishing emails improve an organization\u2019s Net Reporter Score or NRS. The scanning capabilities of KillPhish\u2122 provide indications to employees of potential threats from suspicious emails. Spanish Video English Video Phishing Facts Information security statistics that every company should know. 35% of ransomware attacks are delivered via email. 74% of all security breaches involve the human element. 95% of social engineering attack motivation is financially driven. Take a Test<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-16281","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/ig.technology\/index.php\/wp-json\/wp\/v2\/pages\/16281","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ig.technology\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ig.technology\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ig.technology\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ig.technology\/index.php\/wp-json\/wp\/v2\/comments?post=16281"}],"version-history":[{"count":89,"href":"https:\/\/ig.technology\/index.php\/wp-json\/wp\/v2\/pages\/16281\/revisions"}],"predecessor-version":[{"id":20405,"href":"https:\/\/ig.technology\/index.php\/wp-json\/wp\/v2\/pages\/16281\/revisions\/20405"}],"wp:attachment":[{"href":"https:\/\/ig.technology\/index.php\/wp-json\/wp\/v2\/media?parent=16281"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}