{"id":2463,"date":"2025-01-29T15:37:23","date_gmt":"2025-01-29T14:37:23","guid":{"rendered":"https:\/\/percpass.com\/?p=2463"},"modified":"2025-02-10T12:50:59","modified_gmt":"2025-02-10T11:50:59","slug":"phishing-in-companies","status":"publish","type":"post","link":"https:\/\/percpass.com\/en\/phishing-in-companies\/","title":{"rendered":"Phishing in Companies: How a Password Manager Helps Build Employee Awareness"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2463\" class=\"elementor elementor-2463\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-21e3aac elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"21e3aac\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-00ccd91\" data-id=\"00ccd91\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-396d927 elementor-widget elementor-widget-text-editor\" data-id=\"396d927\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">Phishing is one of the most common threats businesses worldwide face. According to a report by <a href=\"https:\/\/www.proofpoint.com\/us\/resources\/threat-reports\/state-of-phish\">Proofpoint<\/a>, as many as <\/span><b><span data-contrast=\"auto\">71%<\/span><\/b><span data-contrast=\"auto\"> of surveyed organizations have experienced at least one successful phishing attack. Moreover, the cost of a single attack can reach hundreds of thousands of dollars, considering financial losses, reputational damage, and the time required for response.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f1bafcd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f1bafcd\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b9a0fc7\" data-id=\"b9a0fc7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a18bee7 elementor-widget elementor-widget-heading\" data-id=\"a18bee7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What Is Phishing? <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7341820 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7341820\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-8f5e361\" data-id=\"8f5e361\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2077d9e elementor-widget elementor-widget-text-editor\" data-id=\"2077d9e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">Phishing is a modern <\/span><b><span data-contrast=\"auto\">form of fraud<\/span><\/b><span data-contrast=\"auto\"> in which cybercriminals impersonate trusted entities to steal <\/span><b><span data-contrast=\"auto\">confidential data<\/span><\/b><span data-contrast=\"auto\">. The primary goal of phishing is to exploit <\/span><b><span data-contrast=\"auto\">social engineering techniques<\/span><\/b><span data-contrast=\"auto\"> to manipulate victims into voluntarily taking actions that grant attackers access to systems or accounts.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Given the constant rush, information overload, and lack of time for verification, phishing techniques are widespread and continuously evolving. A momentary lapse in judgment\u2014triggered by trust, fear, or time pressure\u2014can expose organizations and individuals to significant risks. The most commonly used phishing techniques include:<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Fake emails <\/span><\/b><span data-contrast=\"auto\">\u2013 Messages resembling correspondence from banks, government agencies, service providers, or colleagues, containing links to fraudulent websites or malicious attachments.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><\/ul><ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Deceptive websites<\/span><\/b><span data-contrast=\"auto\"> \u2013 Pages designed to mimic legitimate websites so closely that they appear indistinguishable at first glance.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><\/ul><ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">SMS messages and phone calls<\/span><\/b><span data-contrast=\"auto\"> \u2013 Communications where cybercriminals request users to click on a link, call back, or provide sensitive data.<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-6d82caa\" data-id=\"6d82caa\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5ea8a45 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"5ea8a45\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"4234\" height=\"2823\" src=\"https:\/\/percpass.com\/wp-content\/uploads\/2025\/01\/phishing.png\" class=\"attachment-full size-full wp-image-2336\" alt=\"Mened\u017cer hase\u0142 - phishing\" srcset=\"https:\/\/percpass.com\/wp-content\/uploads\/2025\/01\/phishing.png 4234w, https:\/\/percpass.com\/wp-content\/uploads\/2025\/01\/phishing-300x200.png 300w, https:\/\/percpass.com\/wp-content\/uploads\/2025\/01\/phishing-1024x683.png 1024w, https:\/\/percpass.com\/wp-content\/uploads\/2025\/01\/phishing-768x512.png 768w, https:\/\/percpass.com\/wp-content\/uploads\/2025\/01\/phishing-1536x1024.png 1536w, https:\/\/percpass.com\/wp-content\/uploads\/2025\/01\/phishing-2048x1365.png 2048w, https:\/\/percpass.com\/wp-content\/uploads\/2025\/01\/phishing-18x12.png 18w\" sizes=\"(max-width: 4234px) 100vw, 4234px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a933a36 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a933a36\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-55b22b8\" data-id=\"55b22b8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e7d6d7f elementor-widget elementor-widget-heading\" data-id=\"e7d6d7f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Phishing vs. Threat Awareness \u2013 The Foundation of Cyber Resilience <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-52207ec elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"52207ec\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-64a2d4c\" data-id=\"64a2d4c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ffbc4bb elementor-widget elementor-widget-text-editor\" data-id=\"ffbc4bb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">The key to phishing prevention is ensuring every employee is <\/span><b><span data-contrast=\"auto\">aware of the risks<\/span><\/b><span data-contrast=\"auto\">. Even the most advanced security technologies will not help if employees continue opening suspicious attachments or clicking on links leading to fake login pages.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Building cyber hygiene\u2014<\/span><b><span data-contrast=\"auto\">establishing good practices and habits for responsible technology use<\/span><\/b><span data-contrast=\"auto\">\u2014should be a priority for every IT leader. Unfortunately, due to overwhelming workloads, this task often remains deprioritized.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Today&#8217;s digital landscape offers a variety of ready-made solutions to support cyber hygiene and awareness-building. Some of the most effective include:<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"5\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Training programs<\/span><\/b><span data-contrast=\"auto\"> \u2013 Educating employees on phishing risks and preventive measures from the outset.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><\/ul><ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"5\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Behavior monitoring systems<\/span><\/b><span data-contrast=\"auto\"> \u2013 Identifying individuals who bypass security measures or resist changes, not to punish them, but to understand their reasons and implement corrective actions.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><\/ul><ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"5\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Up-to-date security standard<\/span><\/b><span data-contrast=\"auto\"><strong>s<\/strong> \u2013 Clearly defined guidelines specifying what actions should be taken to maintain organizational security.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><\/ul><ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"5\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Technological solutions<\/span><\/b><span data-contrast=\"auto\"> \u2013 Including <\/span><b><span data-contrast=\"auto\">password managers<\/span><\/b><span data-contrast=\"auto\">, which not only secure login credentials but also <a href=\"https:\/\/percpass.com\/en\/password-manager-created-to-simplify-teamwork\/\">streamline team collaboration\u00a0<\/a><\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7545fc6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7545fc6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-17b4a88\" data-id=\"17b4a88\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8b8d4cc elementor-widget elementor-widget-heading\" data-id=\"8b8d4cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Password Managers as a Protective Shield <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cc159fe elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cc159fe\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-837be85\" data-id=\"837be85\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0ce8c83 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"0ce8c83\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1014\" height=\"490\" src=\"https:\/\/percpass.com\/wp-content\/uploads\/2025\/01\/password-generator.png\" class=\"attachment-full size-full wp-image-2545\" alt=\"Password manager - phishing - password generator\" srcset=\"https:\/\/percpass.com\/wp-content\/uploads\/2025\/01\/password-generator.png 1014w, https:\/\/percpass.com\/wp-content\/uploads\/2025\/01\/password-generator-300x145.png 300w, https:\/\/percpass.com\/wp-content\/uploads\/2025\/01\/password-generator-768x371.png 768w, https:\/\/percpass.com\/wp-content\/uploads\/2025\/01\/password-generator-18x9.png 18w\" sizes=\"(max-width: 1014px) 100vw, 1014px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-e14fdc5\" data-id=\"e14fdc5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d750e22 elementor-widget elementor-widget-text-editor\" data-id=\"d750e22\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">A password manager is an often-overlooked tool in phishing defense. While it does not eliminate phishing directly, its proper use can significantly reduce the risk of successful attacks and mitigate their potential consequences.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">According to the report &#8222;<a href=\"https:\/\/in.eset.pl\/cyberportret-polskiego-biznesu\">Cyberportrait of Polish Business<\/a>&#8222;, nearly <\/span><b><span data-contrast=\"auto\">29% of users reuse passwords across multiple platforms<\/span><\/b><span data-contrast=\"auto\">, meaning that if one credential is compromised, attackers gain access to multiple accounts, including corporate ones. The<\/span><b><span data-contrast=\"auto\"> perc.pass<\/span><\/b><span data-contrast=\"auto\"> password manager<\/span><b><span data-contrast=\"auto\"> eliminates this risk<\/span><\/b><span data-contrast=\"auto\"> by generating unique, strong passwords and securely storing them while enabling secure password sharing within an organization.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-810c990 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"810c990\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-b25c72f\" data-id=\"b25c72f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-38dd57f elementor-widget elementor-widget-text-editor\" data-id=\"38dd57f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">Another key advantage of <\/span><b><span data-contrast=\"auto\">perc.pass<\/span><\/b><span data-contrast=\"auto\"> is its ability to detect suspicious websites. The manager will never autofill login credentials on an unrecognized site, prompting users to carefully examine the URL for potential phishing attempts.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Additionally, users can check whether their credentials have been exposed in known data breaches. If a password appears in a compromised database, it should be changed immediately to prevent unauthorized access.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-76f21ca\" data-id=\"76f21ca\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a6f5190 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"a6f5190\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1232\" height=\"452\" src=\"https:\/\/percpass.com\/wp-content\/uploads\/2025\/01\/leaks.png\" class=\"attachment-full size-full wp-image-2546\" alt=\"Password Manager - phishing leaks\" srcset=\"https:\/\/percpass.com\/wp-content\/uploads\/2025\/01\/leaks.png 1232w, https:\/\/percpass.com\/wp-content\/uploads\/2025\/01\/leaks-300x110.png 300w, https:\/\/percpass.com\/wp-content\/uploads\/2025\/01\/leaks-1024x376.png 1024w, https:\/\/percpass.com\/wp-content\/uploads\/2025\/01\/leaks-768x282.png 768w, https:\/\/percpass.com\/wp-content\/uploads\/2025\/01\/leaks-18x7.png 18w\" sizes=\"(max-width: 1232px) 100vw, 1232px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-588606b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"588606b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-465d5e5\" data-id=\"465d5e5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ae9d1f2 elementor-widget elementor-widget-heading\" data-id=\"ae9d1f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">A Comprehensive Approach to Security <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cf6f144 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cf6f144\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9f4dd4f\" data-id=\"9f4dd4f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b36d086 elementor-widget elementor-widget-text-editor\" data-id=\"b36d086\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">Phishing is a rapidly evolving threat that requires a multi-layered defense strategy. Combining <\/span><b><span data-contrast=\"auto\">employee education, security tools like password managers, and regular security audits<\/span><\/b><span data-contrast=\"auto\"> is the most effective way to minimize risks.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">In a world where cybercriminals continuously refine their tactics, <\/span><b><span data-contrast=\"auto\">awareness and the right tools are the keys to security<\/span><\/b><span data-contrast=\"auto\">\u2014both for small businesses and large enterprises.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7266928 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7266928\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-b6c1746\" data-id=\"b6c1746\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5fda513 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"5fda513\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/app.percpass.com\/sign-up?type=TRIAL\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Start a free trial<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-b5eb92b\" data-id=\"b5eb92b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a6e03c9 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"a6e03c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/percpass.com\/#contact\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-30200a4\" data-id=\"30200a4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-67a5b7e elementor-align-center elementor-widget elementor-widget-button\" data-id=\"67a5b7e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/percpass.com\/en\/security-whitepaper\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Security Whitepaper<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Phishing is one of the most common threats businesses worldwide face. According to a report by Proofpoint, as many as 71% of surveyed organizations have experienced at least one successful phishing attack. Moreover, the cost of a single attack can reach hundreds of thousands of dollars, considering financial losses, reputational damage, and the time required [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2351,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","ocean_post_oembed":"","ocean_post_self_hosted_media":"","ocean_post_video_embed":"","ocean_link_format":"","ocean_link_format_target":"self","ocean_quote_format":"","ocean_quote_format_link":"post","ocean_gallery_link_images":"on","ocean_gallery_id":[],"footnotes":""},"categories":[14],"tags":[],"class_list":["post-2463","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles","entry","has-media"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Phishing in companies - perc.pass<\/title>\n<meta name=\"description\" content=\"How a password manager helps build employee awareness of threats like phishing and how it can change your company security level.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/percpass.com\/en\/phishing-in-companies\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing in companies - perc.pass\" \/>\n<meta property=\"og:description\" content=\"How a password manager helps build employee awareness of threats like phishing and how it can change your company security level.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/percpass.com\/en\/phishing-in-companies\/\" \/>\n<meta property=\"og:site_name\" content=\"perc.pass\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-29T14:37:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-10T11:50:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/percpass.com\/wp-content\/uploads\/2025\/01\/high-angle-credit-card-with-hook-phishing_23-2148578117.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1380\" \/>\n\t<meta property=\"og:image:height\" content=\"920\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"perc.pass\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"perc.pass\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/percpass.com\\\/en\\\/phishing-in-companies\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/percpass.com\\\/en\\\/phishing-in-companies\\\/\"},\"author\":{\"name\":\"perc.pass\",\"@id\":\"https:\\\/\\\/percpass.com\\\/en\\\/#\\\/schema\\\/person\\\/d0a0cb1d04863d972a8896a2c7d6b7cb\"},\"headline\":\"Phishing in Companies: How a Password Manager Helps Build Employee Awareness\",\"datePublished\":\"2025-01-29T14:37:23+00:00\",\"dateModified\":\"2025-02-10T11:50:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/percpass.com\\\/en\\\/phishing-in-companies\\\/\"},\"wordCount\":620,\"publisher\":{\"@id\":\"https:\\\/\\\/percpass.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/percpass.com\\\/en\\\/phishing-in-companies\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/percpass.com\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/high-angle-credit-card-with-hook-phishing_23-2148578117.jpg\",\"articleSection\":[\"Articles\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/percpass.com\\\/en\\\/phishing-in-companies\\\/\",\"url\":\"https:\\\/\\\/percpass.com\\\/en\\\/phishing-in-companies\\\/\",\"name\":\"Phishing in companies - perc.pass\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/percpass.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/percpass.com\\\/en\\\/phishing-in-companies\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/percpass.com\\\/en\\\/phishing-in-companies\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/percpass.com\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/high-angle-credit-card-with-hook-phishing_23-2148578117.jpg\",\"datePublished\":\"2025-01-29T14:37:23+00:00\",\"dateModified\":\"2025-02-10T11:50:59+00:00\",\"description\":\"How a password manager helps build employee awareness of threats like phishing and how it can change your company security level.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/percpass.com\\\/en\\\/phishing-in-companies\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/percpass.com\\\/en\\\/phishing-in-companies\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/percpass.com\\\/en\\\/phishing-in-companies\\\/#primaryimage\",\"url\":\"https:\\\/\\\/percpass.com\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/high-angle-credit-card-with-hook-phishing_23-2148578117.jpg\",\"contentUrl\":\"https:\\\/\\\/percpass.com\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/high-angle-credit-card-with-hook-phishing_23-2148578117.jpg\",\"width\":1380,\"height\":920,\"caption\":\"phishing\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/percpass.com\\\/en\\\/phishing-in-companies\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\\\/\\\/percpass.com\\\/en\\\/modern-password-manager\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Phishing in Companies: How a Password Manager Helps Build Employee Awareness\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/percpass.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/percpass.com\\\/en\\\/\",\"name\":\"perc.pass\",\"description\":\"Mened\u017cer hase\u0142 w 100% zgodny z wymaganiami RODO\",\"publisher\":{\"@id\":\"https:\\\/\\\/percpass.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/percpass.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/percpass.com\\\/en\\\/#organization\",\"name\":\"perc.pass\",\"url\":\"https:\\\/\\\/percpass.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/percpass.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/percpass.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/cropped-percpass-logo-rounded.png\",\"contentUrl\":\"https:\\\/\\\/percpass.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/cropped-percpass-logo-rounded.png\",\"width\":1077,\"height\":295,\"caption\":\"perc.pass\"},\"image\":{\"@id\":\"https:\\\/\\\/percpass.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/percpass.com\\\/en\\\/#\\\/schema\\\/person\\\/d0a0cb1d04863d972a8896a2c7d6b7cb\",\"name\":\"perc.pass\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bbe0d5903e3e3bdc694832a743c8028857c7548283c5a6ed272dd773baee4d13?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bbe0d5903e3e3bdc694832a743c8028857c7548283c5a6ed272dd773baee4d13?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bbe0d5903e3e3bdc694832a743c8028857c7548283c5a6ed272dd773baee4d13?s=96&d=mm&r=g\",\"caption\":\"perc.pass\"},\"sameAs\":[\"http:\\\/\\\/percpass.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Phishing in companies - perc.pass","description":"How a password manager helps build employee awareness of threats like phishing and how it can change your company security level.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/percpass.com\/en\/phishing-in-companies\/","og_locale":"en_US","og_type":"article","og_title":"Phishing in companies - perc.pass","og_description":"How a password manager helps build employee awareness of threats like phishing and how it can change your company security level.","og_url":"https:\/\/percpass.com\/en\/phishing-in-companies\/","og_site_name":"perc.pass","article_published_time":"2025-01-29T14:37:23+00:00","article_modified_time":"2025-02-10T11:50:59+00:00","og_image":[{"width":1380,"height":920,"url":"https:\/\/percpass.com\/wp-content\/uploads\/2025\/01\/high-angle-credit-card-with-hook-phishing_23-2148578117.jpg","type":"image\/jpeg"}],"author":"perc.pass","twitter_card":"summary_large_image","twitter_misc":{"Written by":"perc.pass","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/percpass.com\/en\/phishing-in-companies\/#article","isPartOf":{"@id":"https:\/\/percpass.com\/en\/phishing-in-companies\/"},"author":{"name":"perc.pass","@id":"https:\/\/percpass.com\/en\/#\/schema\/person\/d0a0cb1d04863d972a8896a2c7d6b7cb"},"headline":"Phishing in Companies: How a Password Manager Helps Build Employee Awareness","datePublished":"2025-01-29T14:37:23+00:00","dateModified":"2025-02-10T11:50:59+00:00","mainEntityOfPage":{"@id":"https:\/\/percpass.com\/en\/phishing-in-companies\/"},"wordCount":620,"publisher":{"@id":"https:\/\/percpass.com\/en\/#organization"},"image":{"@id":"https:\/\/percpass.com\/en\/phishing-in-companies\/#primaryimage"},"thumbnailUrl":"https:\/\/percpass.com\/wp-content\/uploads\/2025\/01\/high-angle-credit-card-with-hook-phishing_23-2148578117.jpg","articleSection":["Articles"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/percpass.com\/en\/phishing-in-companies\/","url":"https:\/\/percpass.com\/en\/phishing-in-companies\/","name":"Phishing in companies - perc.pass","isPartOf":{"@id":"https:\/\/percpass.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/percpass.com\/en\/phishing-in-companies\/#primaryimage"},"image":{"@id":"https:\/\/percpass.com\/en\/phishing-in-companies\/#primaryimage"},"thumbnailUrl":"https:\/\/percpass.com\/wp-content\/uploads\/2025\/01\/high-angle-credit-card-with-hook-phishing_23-2148578117.jpg","datePublished":"2025-01-29T14:37:23+00:00","dateModified":"2025-02-10T11:50:59+00:00","description":"How a password manager helps build employee awareness of threats like phishing and how it can change your company security level.","breadcrumb":{"@id":"https:\/\/percpass.com\/en\/phishing-in-companies\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/percpass.com\/en\/phishing-in-companies\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/percpass.com\/en\/phishing-in-companies\/#primaryimage","url":"https:\/\/percpass.com\/wp-content\/uploads\/2025\/01\/high-angle-credit-card-with-hook-phishing_23-2148578117.jpg","contentUrl":"https:\/\/percpass.com\/wp-content\/uploads\/2025\/01\/high-angle-credit-card-with-hook-phishing_23-2148578117.jpg","width":1380,"height":920,"caption":"phishing"},{"@type":"BreadcrumbList","@id":"https:\/\/percpass.com\/en\/phishing-in-companies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/percpass.com\/en\/modern-password-manager\/"},{"@type":"ListItem","position":2,"name":"Phishing in Companies: How a Password Manager Helps Build Employee Awareness"}]},{"@type":"WebSite","@id":"https:\/\/percpass.com\/en\/#website","url":"https:\/\/percpass.com\/en\/","name":"perc.pass","description":"Mened\u017cer hase\u0142 w 100% zgodny z wymaganiami RODO","publisher":{"@id":"https:\/\/percpass.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/percpass.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/percpass.com\/en\/#organization","name":"perc.pass","url":"https:\/\/percpass.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/percpass.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/percpass.com\/wp-content\/uploads\/2024\/03\/cropped-percpass-logo-rounded.png","contentUrl":"https:\/\/percpass.com\/wp-content\/uploads\/2024\/03\/cropped-percpass-logo-rounded.png","width":1077,"height":295,"caption":"perc.pass"},"image":{"@id":"https:\/\/percpass.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/percpass.com\/en\/#\/schema\/person\/d0a0cb1d04863d972a8896a2c7d6b7cb","name":"perc.pass","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/bbe0d5903e3e3bdc694832a743c8028857c7548283c5a6ed272dd773baee4d13?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/bbe0d5903e3e3bdc694832a743c8028857c7548283c5a6ed272dd773baee4d13?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bbe0d5903e3e3bdc694832a743c8028857c7548283c5a6ed272dd773baee4d13?s=96&d=mm&r=g","caption":"perc.pass"},"sameAs":["http:\/\/percpass.com"]}]}},"_links":{"self":[{"href":"https:\/\/percpass.com\/en\/wp-json\/wp\/v2\/posts\/2463","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/percpass.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/percpass.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/percpass.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/percpass.com\/en\/wp-json\/wp\/v2\/comments?post=2463"}],"version-history":[{"count":16,"href":"https:\/\/percpass.com\/en\/wp-json\/wp\/v2\/posts\/2463\/revisions"}],"predecessor-version":[{"id":2696,"href":"https:\/\/percpass.com\/en\/wp-json\/wp\/v2\/posts\/2463\/revisions\/2696"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/percpass.com\/en\/wp-json\/wp\/v2\/media\/2351"}],"wp:attachment":[{"href":"https:\/\/percpass.com\/en\/wp-json\/wp\/v2\/media?parent=2463"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/percpass.com\/en\/wp-json\/wp\/v2\/categories?post=2463"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/percpass.com\/en\/wp-json\/wp\/v2\/tags?post=2463"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}