Phishing Resources

Get free phishing animations, downloads, and the latest news and advice about phishing attacks in MediaPRO’s Phishing Resources Center.

White Paper: How-To Guide for Simulated Phishing Campaigns

You probably know how dangerous phishing attempts are to an organization, and see the value in sending fake phishing emails to your employees.  But how do you know how to get the most out of your simulated phishing campaigns? We’re not here to offer advice on what simulated phishing vendor to choose (we do just so happen to have … Continued

View Resource

4 Ways to Use Real Phishing Emails to Educate

We get sent a lot of phishing emails. In fact, we have a whole Outlook inbox filled with them, after my colleagues dutifully report them to our IT team. The more we get, the more I’ve thought, “Damn, someone put some thought into this.” I mean, not a massive amount of thought in some instances. … Continued

View Resource

Free Phishing Quiz: What Kind of Phish Are You?

Let’s face it: life is hectic. Especially so for those running cybersecurity and data privacy awareness programs. Staying up to date on the latest cyberthreats and keeping your employees engaged in protecting your organization is undoubtedly a full-time job (even if your job description doesn’t say so). At MediaPRO, we understand the struggle and commend … Continued

View Resource

Is All Fair in Simulated Phishing?

This article originally appeared on CSO Online. We’ve all heard the saying “all is fair in love and war,” but what about when it comes to simulated phishing? Is there a limit to how far we should go in attempting to emulate the trickery and deceptive tactics of the cybercriminals who bombard our employees with … Continued

View Resource

Infographic: 3 PII Phishing Tactics to Look Out For

Personally identifiable information (PII) is some of the most valuable data that cybercriminals go after. With a Social Security number and birthdate, an industrious hacker could take control of nearly all aspects of your or a coworker’s life. With this much up for grabs, cybercriminals are turning to the keepers of this data—you, your employees … Continued

View Resource

Spear Phishing: A Quick Guide to Avoiding the Bait

You work in your company’s finance department, making sure all the bills get paid on time. You’re wrapping up your day and about to put your computer to sleep for the evening when a new email pops up. It’s from your boss, and it looks urgent. She’s asking for the necessary information to transfer some … Continued

View Resource

On-Demand Webinar: Keeping Users Off the Spear Phishing Hook

Watch our free on-demand webinar to explore user-based ways to combat one of the most pervasive cyberthreats today: Spear phishing. More than ever, IT security teams are running simulated phishing campaigns and deploying end-user security awareness training to reduce their exposure to phishing threats. Despite this, phishing emails were still the primary suspect in more … Continued

View Resource

Infographic: How to Spot a Phishy Email

Have you ever gotten an email that just didn’t seem right? An email that was worded oddly, had misspellings, or was threatening? Chances are you have, and chances are that was a phishing attempt. In 2016, 1 in 14 users “took the bait” and clicked on a link or opened an attachment in a phishy … Continued

View Resource

5 Signs You Just Got a Phishing Email

“I don’t know why you unethical f–kers think you can get away with this.” Pretty shocking, right? That was one of the more memorable phishing email subject lines my colleagues recently spotted in their work inbox. This particular attempt went on to ask why the sender wouldn’t pay an “invoice” attached to the email. Our … Continued

View Resource

The Google Docs Phishing Scam: A Win for Security Awareness

Originally published on the Tripwire Security Awareness blog. Even if you weren’t aware of it, you likely contributed to the security awareness of the global Internet community during the first week of May. By now you’ve undoubtedly heard of the phishing scam using a phony Google Docs third-party extension. Across all sectors of social media, … Continued

View Resource
Page 1 of 212