Most effective form of security awareness training.
Unlike traditional training programs, users learn in real-time on actual attacks.
Business Email Compromise (Whaling)
Impersonation of a CEO, CFO, or trusted individual.
Targeted attacks with no malicious payload and URLs that aren't on any blacklists.
Macros within Office documents can be obfuscated and easily let through.
Domain Similarity Attacks
Domain name misspellings and homoglyphs.
Impersonating well-known brands with like-kind domain names, content, and brand logos.
Zero Day Phishing Attacks
New attack vectors that exploit email clients, file types, or human trust.
Seamless Setup with OAuth. No mail routing changes.
Sublime aligned with my goal of arming the sheep instead of fighting the wolves, teaching employees to protect themselves rather than extending the email gateway security Maginot Line.