{"id":569,"date":"2020-02-02T21:02:51","date_gmt":"2020-02-02T21:02:51","guid":{"rendered":"https:\/\/www.computerdojo.com\/www\/?post_type=service&#038;p=569"},"modified":"2021-03-09T23:20:31","modified_gmt":"2021-03-09T23:20:31","slug":"phishing-campaigns-training","status":"publish","type":"service","link":"https:\/\/www.computerdojo.com\/www\/index.php\/service\/phishing-campaigns-training\/","title":{"rendered":"Phishing Campaigns &#038; Training"},"content":{"rendered":"<p>[vc_section][vc_row][vc_column width=&#8221;1\/3&#8243; offset=&#8221;vc_hidden-sm vc_hidden-xs&#8221;][vc_wp_custommenu nav_menu=&#8221;37&#8243; title=&#8221;Services&#8221;][\/vc_column][vc_column offset=&#8221;vc_col-md-8&#8243;][vc_single_image source=&#8221;featured_image&#8221; img_size=&#8221;medium&#8221;][vc_column_text]<\/p>\n<ul>\n<li><strong>Phishing Campaigns &amp; Training<br \/>\n<\/strong>In the modern IT threat landscape, the focus is increasingly on the end user. Phishing and other malicious email-based attacks are one of the leading causes of security breaches, theft of critical business data, theft of corporate revenue, and general disruption to core business operations. Computer Dojo partners with the industry\u2019s best phishing training and assessment vendor to provide comprehensive testing and remediation of end user knowledge gaps and poor email security postures. We work with our clients to craft customized, business-relevant emails to \u2018test\u2019 users, catch compromising behavior, pinpoint areas of overall weakness, and then provide targeted and ongoing training to maximize the efficiency of the overall campaign. Our goal is to arm today\u2019s workers with best-in-class knowledge and practices to ensure the security of their organization\u2019s data, revenue, and operational efficiency is never compromised. Our services in this area have helped businesses of all sizes improve their security posture, and we have the results to prove it.<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_column_text][\/vc_column_text][\/vc_column][\/vc_row][\/vc_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_section][vc_row][vc_column width=&#8221;1\/3&#8243; offset=&#8221;vc_hidden-sm vc_hidden-xs&#8221;][vc_wp_custommenu nav_menu=&#8221;37&#8243; title=&#8221;Services&#8221;][\/vc_column][vc_column offset=&#8221;vc_col-md-8&#8243;][vc_single_image source=&#8221;featured_image&#8221; img_size=&#8221;medium&#8221;][vc_column_text] Phishing Campaigns &amp; Training In the modern IT threat landscape, the focus is increasingly on the end user. Phishing and other malicious email-based attacks are one of the leading causes of security breaches, theft of critical business data, theft of corporate revenue, and general disruption to [&hellip;]<\/p>\n","protected":false},"featured_media":847,"parent":0,"menu_order":3,"template":"","_links":{"self":[{"href":"https:\/\/www.computerdojo.com\/www\/index.php\/wp-json\/wp\/v2\/service\/569"}],"collection":[{"href":"https:\/\/www.computerdojo.com\/www\/index.php\/wp-json\/wp\/v2\/service"}],"about":[{"href":"https:\/\/www.computerdojo.com\/www\/index.php\/wp-json\/wp\/v2\/types\/service"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.computerdojo.com\/www\/index.php\/wp-json\/wp\/v2\/media\/847"}],"wp:attachment":[{"href":"https:\/\/www.computerdojo.com\/www\/index.php\/wp-json\/wp\/v2\/media?parent=569"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}