What Is Phishing?
What is Phishing and how can VENZA help? How do cybercriminals acquire sensitive data? In a typical phishing effort, a target (or targets) are contacted
Generating the Risk Score Card
Navigating the VENZA System™ Dashboard
Accessing The New VENZA System™
Generating the Executive Summary
Bulk-Upload Multiple New Users
Phishing Campaign False Positives
Certifying Group Training Attendees
How to Assign Courses and Learning Paths
Generate the Phishing Simulation Report
Phishing Simulations with VENZA
Course Navigation Troubleshooting
How to Run the Training Percentage Report
Set up Auto-Reports in VENZA Peak
What is Phishing and how can VENZA help? How do cybercriminals acquire sensitive data? In a typical phishing effort, a target (or targets) are contacted