Spear Phishing - Understanding the threat

Created:  29 Sep 2016
Updated:  29 Sep 2016
CPNI Archive

Archive content originally produced by CPNI that has not yet been absorbed into the new NCSC web pages.

This paper describes how Spear Phishing attacks work, the likelihood of being targeted and the steps an organisation can take to manage the business risks.

Spear Phishing - Understanding the Threat.pdf

PDF, 479.38KB

This file may not be suitable for users of assistive technology.

Was this document helpful?

We need your feedback to improve this content.

Yes No