Phishing schemes


Research phishing schemes on the Web and identify a recent scheme (from the last six months). Summarize the phishing scheme you chose and discuss why it may have been successful. What are the red flags that one should look out for to avoid becoming a victim? What should one do if one encounters such schemes?

As a security manager, what actions might you take to assure your company does not fall victim to phishing? Include any training or simulation/white hat hacking you might consider.

150- 250 words