Erika Maharjan
Articles
-
Add a Credential Capture to Email Template
Credential phishing attacks are commonly used to impersonate a brand. Typically, the phishing email will include a link to a website that will attempt to capture the victim's credentials. This meth...
-
Training : Schedule Training blocks
Platform Admins can schedule trainings in two different ways, dependent on your needs or preference. Via Individual Course You can schedule training directly from a specific course. This method ...
-
Phish Focus : Learner Experience
Phish Focus allows you to take greater advantage of your human firewall. You can easily manage and action emails that have been reported by Learners through the Phish Reporter. See below for Learne...
-
Enable Impact Report
The Impact Report allows Admins to assign a $$ value to an action to quickly determine the potential impact to your organisation. This can be used to show stakeholders the benefit and need for secu...
-
FAQs : User Synchronisation
What Active Directory integrations do you offer and how to setup AD integrations? There are two methods of Active Directory integration that we currently offer.User (Learner) synchronisationena...
-
FAQ : Phish Focus
How can I add Phish Focus to my Subscription? Reach out to your Customer Success Manager for more information about adding Phish Focus to your subscription. How much does Phish Focus cost? Cost...
-
Un-Install and Re-Install : Google Workspace Phish Reporter
This article takes you through the steps to un-install the Phish Reporter add-in in Google Workspace. Navigate to Google Admin console and select Apps. Select Google Workspace Marketplace apps > ...
-
Training > Individual Course : Reschedule an Individual Training
There are times when staff are unable to complete their training courses in the designated time. If their training block has expired, or if they have not started, failed, or haven’t completed the t...
-
Campaigns : Schedule Monthly Phishing Campaigns
The Monthly Phishing Campaign is a continuous chain of monthly phishing emails designed to progressively improve the detection and reporting capabilities of your staff for real-life instances of ph...
-
FAQs : Learning Paths > Timeline
What happens when an individual clicks into a Campaign simulated phishing email?If a Learner clicks on an attachment or link in a Phriendly Phishing simulated phishing email, they are then directed...