Defended phishing simulation
- Category: Personal security
- Points: 10
Rationale
Successfully identifying phishing attacks protects credentials and sensitive data from compromise through deceptive emails and messages.
How to do it
Report suspicious emails during phishing simulations and explain why the email was deemed malicious.
Expected Evidence
Provide sanitized phishing simulation results, confirming successful identification.