Prolog In my last article about this topic I have described how you can perform simulated phishing attacks on your own infrastructure. This is all about raising the awareness of your own employees. If you haven’t read this article yet, I recommend you do that later. This article is based in many points of the […]
06/01/2020