Ebook: Making the Business Case for Intake and Workflow Automation Software. Download Now
A method of trying to gather personal information using deceptive e-mails and websites.
The information security team should educate employees and users who have access to company systems to identify phishing attacks.