Skip to content

Firewall Times

  • About

Phishing

39 Must-Read Phishing Statistics & Facts – 2022

August 9, 2022August 8, 2022 by Catherine Reed

10 Eye-Catching Spear Phishing Statistics – 2022

May 9, 2022 by Catherine Reed

Spear Phishing vs Phishing: Know the Difference

April 7, 2022April 7, 2022 by Michael X. Heiligenstein

6 Phishing Email Examples: How to Spot the Scam

March 31, 2022March 30, 2022 by Michael X. Heiligenstein

Where to Report Suspected Phishing Emails

December 2, 2020December 2, 2020 by Catherine Reed

Whale Phishing: Everything You Need to Know

November 30, 2020November 18, 2020 by Michael X. Heiligenstein

Phishing Attacks: The Definitive Guide

August 2, 2022October 26, 2020 by Michael X. Heiligenstein

17 Ways to Identify and Prevent Phishing Attacks

October 26, 2020October 23, 2020 by Michael X. Heiligenstein

How Phishing Scams Work – And How to Protect Yourself

October 8, 2020 by Michael X. Heiligenstein

Vishing, aka Voice Phishing: How to Protect Yourself

October 7, 2020 by Michael X. Heiligenstein

Spear Phishing Attacks: What You Need to Know

September 1, 2021September 29, 2020 by Michael X. Heiligenstein

6 Spear Phishing Example Emails – Plus Tips on Staying Safe

June 28, 2021September 26, 2020 by Michael X. Heiligenstein

Smishing, aka SMS Phishing: How to Protect Yourself

September 29, 2020September 25, 2020 by Michael X. Heiligenstein

10 Types of Phishing Attacks – With Examples

September 25, 2020 by Michael X. Heiligenstein

Phishing Awareness Training: How to Protect Your Organization

September 25, 2020 by Michael X. Heiligenstein

Topics

  • Access Control (18)
  • Attacks (19)
  • Breaches (21)
  • Compliance (5)
  • Data (5)
  • Fraud (2)
  • Miscellaneous (2)
  • Network Security (1)
  • Phishing (15)
  • Privacy (4)
  • Resilience (5)
  • Risk Management (3)
  • Security Controls (6)
  • Statistics (11)
  • Tech (14)

Related Posts

  • 10 Eye-Catching Spear Phishing Statistics – 2022
  • Spear Phishing vs Phishing: Know the Difference
  • 6 Phishing Email Examples: How to Spot the Scam
  • Where to Report Suspected Phishing Emails
  • Whale Phishing: Everything You Need to Know
About

Privacy Policy

Contact
© 2023 Firewall Times • Built with GeneratePress