What are the most effective types of security controls and user training approaches for dealing with phishing?

 

Although many people are aware of phishing attacks, there are still a large number of successful compromises.

Phishing attacks counterfeit communications from a legitimate/trustworthy source to mislead recipients into revealing sensitive information. Email containing malware-infected links is the main means of conducting phishing attacks, but attackers are also increasingly using social media  for phishing to exploit vulnerable individuals.

For more information click here