Defended phishing simulation

Rationale

Successfully identifying phishing attacks protects credentials and sensitive data from compromise through deceptive emails and messages.

How to do it

Report suspicious emails during phishing simulations and explain why the email was deemed malicious.

Expected Evidence

Provide sanitized phishing simulation results, confirming successful identification.