{% set baseFontFamily = "Open Sans" %} /* Add the font family you wish to use. You may need to import it above. */

{% set headerFontFamily = "Open Sans" %} /* This affects only headers on the site. Add the font family you wish to use. You may need to import it above. */

{% set textColor = "#565656" %} /* This sets the universal color of dark text on the site */

{% set pageCenter = "1100px" %} /* This sets the width of the website */

{% set headerType = "fixed" %} /* To make this a fixed header, change the value to "fixed" - otherwise, set it to "static" */

{% set lightGreyColor = "#f7f7f7" %} /* This affects all grey background sections */

{% set baseFontWeight = "normal" %} /* More than likely, you will use one of these values (higher = bolder): 300, 400, 700, 900 */

{% set headerFontWeight = "normal" %} /* For Headers; More than likely, you will use one of these values (higher = bolder): 300, 400, 700, 900 */

{% set buttonRadius = '40px' %} /* "0" for square edges, "10px" for rounded edges, "40px" for pill shape; This will change all buttons */

After you have updated your stylesheet, make sure you turn this module off

Phishing Insights from 2021

by Max Rotter on October 21, 2021

DOWNLOAD THE FULL PHISHING REPORT HERE

frustrated with problems young business man working on laptop computer at home

While phishing has been around for a quarter of a century, it remains an effective cyberattack technique primarily because it continues to evolve. Adversaries are quick to identify new phishing opportunities – of which the pandemic provided many – and develop new tactics and techniques.

This report provides the latest insights into phishing based on an independent survey of 5,400 IT professionals at the IT frontline around the globe, along with a case study of a real-world phishing attack that led to a multi-million-dollar ransomware incident.

For organizations, phishing is often the first step in a complex, multi-stage
attack. Adversaries frequently use phishing to trick users into installing malware or sharing credentials that provide access to their victim’s network.

Read the full report now and learn tips on how to increase your security posture. 

Topics: Sophos, Network Security

Explore Our Full Cisco Line Up
VIEW MORE ABOUT CISCO
cisco devices-2