{"id":88833,"date":"2025-08-23T15:47:14","date_gmt":"2025-08-23T13:47:14","guid":{"rendered":"https:\/\/skillbest.com\/best-practice\/phishing-elearning\/"},"modified":"2025-08-23T16:45:06","modified_gmt":"2025-08-23T14:45:06","slug":"phishing-elearning","status":"publish","type":"best-practice","link":"https:\/\/skillbest.com\/en\/best-practice\/phishing-elearning\/","title":{"rendered":"Phishing e-Learning"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row row_height_percent=&#8221;20&#8243; back_color=&#8221;color-672943&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;0&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_visibility=&#8221;yes&#8221; mobile_visibility=&#8221;yes&#8221; row_height_pixel=&#8221;115&#8243;][vc_column column_width_percent=&#8221;100&#8243; position_vertical=&#8221;middle&#8221; gutter_size=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_row_inner row_inner_height_percent=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;0&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; row_height_pixel=&#8221;50&#8243;][vc_column_inner column_width_percent=&#8221;100&#8243; position_vertical=&#8221;middle&#8221; gutter_size=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; align_medium=&#8221;align_center_tablet&#8221; medium_width=&#8221;7&#8243; align_mobile=&#8221;align_center_mobile&#8221; mobile_width=&#8221;7&#8243; width=&#8221;1\/6&#8243; mobile_height=&#8221;200&#8243;][vc_single_image media=&#8221;82232&#8243; media_width_percent=&#8221;100&#8243; media_ratio=&#8221;sixteen-nine&#8221; el_class=&#8221;.skillbest-icons-default-width&#8221;][\/vc_column_inner][vc_column_inner column_width_percent=&#8221;100&#8243; position_vertical=&#8221;middle&#8221; gutter_size=&#8221;2&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; align_medium=&#8221;align_center_tablet&#8221; medium_width=&#8221;7&#8243; align_mobile=&#8221;align_center_mobile&#8221; mobile_width=&#8221;7&#8243; width=&#8221;5\/6&#8243;][vc_custom_heading text_color=&#8221;color-185359&#8243; heading_semantic=&#8221;div&#8221; text_font=&#8221;font-604939&#8243; text_size=&#8221;fontsize-330338&#8243; text_weight=&#8221;300&#8243; uncode_shortcode_id=&#8221;187177&#8243; text_color_type=&#8221;uncode-palette&#8221;]LEARNING DESIGN \/ CHALLENGE[\/vc_custom_heading][vc_custom_heading text_color=&#8221;color-185359&#8243; heading_semantic=&#8221;div&#8221; text_font=&#8221;font-604939&#8243; text_size=&#8221;fontsize-330338&#8243; text_weight=&#8221;300&#8243; uncode_shortcode_id=&#8221;423186&#8243; text_color_type=&#8221;uncode-palette&#8221;]<a href=\"https:\/\/skillbest.com\/en\/elearning-best-practices\/\">Best Practices<\/a> \/ Phishing e-Learning[\/vc_custom_heading][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;0&#8243; top_padding=&#8221;0&#8243; bottom_padding=&#8221;3&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;3&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; content_parallax=&#8221;0&#8243; uncode_shortcode_id=&#8221;157803&#8243;][vc_column column_width_percent=&#8221;100&#8243; gutter_size=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_single_image media=&#8221;88812&#8243; media_width_percent=&#8221;100&#8243; uncode_shortcode_id=&#8221;193095&#8243;][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;2&#8243; top_padding=&#8221;2&#8243; bottom_padding=&#8221;3&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;3&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column column_width_percent=&#8221;100&#8243; gutter_size=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/3&#8243;][vc_custom_heading text_color=&#8221;color-554342&#8243; heading_semantic=&#8221;h6&#8243; text_size=&#8221;fontsize-197929&#8243; text_transform=&#8221;uppercase&#8221; uncode_shortcode_id=&#8221;923195&#8243; text_color_type=&#8221;uncode-palette&#8221;]Phishing e-Learning[\/vc_custom_heading][vc_empty_space empty_h=&#8221;0&#8243;][vc_separator sep_color=&#8221;color-554342&#8243; el_width=&#8221;10%&#8221; el_height=&#8221;1px&#8221;][\/vc_column][vc_column column_width_percent=&#8221;100&#8243; position_horizontal=&#8221;left&#8221; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;2\/3&#8243;][vc_custom_heading text_color=&#8221;color-154192&#8243; heading_semantic=&#8221;h1&#8243; text_font=&#8221;font-604939&#8243; text_size=&#8221;fontsize-101650&#8243; text_weight=&#8221;400&#8243; uncode_shortcode_id=&#8221;187749&#8243; text_color_type=&#8221;uncode-palette&#8221;]Authentic e-learning against fake e-mails[\/vc_custom_heading][vc_column_text text_lead=&#8221;yes&#8221; uncode_shortcode_id=&#8221;134386&#8243;]Our best practice for <strong>phishing e-learning<\/strong> shows how companies can effectively sensitize their employees to dealing with fake emails. Instead of relying on standardized training courses, a didactic approach is presented that optimally combines theory and practice. First, the basics of phishing are explained: typical characteristics of phishing emails, tricks with links and URLs as well as the most important warning signals to look out for. This is followed by an <strong>interactive challenge<\/strong> in which learners have to check several authentically designed emails &#8211; adapted to the respective corporate environment. The aim is not only to decide whether it is a <strong>phishing email<\/strong>, but also to highlight the specific clues that expose the fraud. In this way, a practical and individual <strong>phishing awareness training course<\/strong> is created that shows how e-learning can be set up in the company to strengthen employee protection and <a href=\"https:\/\/skillbest.com\/en\/cybersecurity-online-training-necessary-and-meaningful\/\">cyber security<\/a> in the long term.     <\/p>\n<p><strong>Phishing e-learning<\/strong> is particularly effective when it is used specifically at the moment of need: for example, when an employee has actually fallen for a <strong>phishing email<\/strong>. The appropriate training can be assigned automatically via the <a href=\"https:\/\/skillbest.com\/en\/learning-management-system\/\">learning management system<\/a> &#8211; so individual learning takes place where it is needed, rather than according to the watering can principle.[\/vc_column_text][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;2&#8243; top_padding=&#8221;3&#8243; bottom_padding=&#8221;2&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;4&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; uncode_shortcode_id=&#8221;206167&#8243;][vc_column column_width_percent=&#8221;100&#8243; position_vertical=&#8221;middle&#8221; gutter_size=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/2&#8243; uncode_shortcode_id=&#8221;350922&#8243;][vc_row_inner row_inner_height_percent=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;3&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column_inner column_width_percent=&#8221;100&#8243; gutter_size=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_custom_heading text_color=&#8221;color-554342&#8243; heading_semantic=&#8221;h6&#8243; text_size=&#8221;fontsize-197929&#8243; text_transform=&#8221;uppercase&#8221; uncode_shortcode_id=&#8221;860416&#8243; text_color_type=&#8221;uncode-palette&#8221;]Phishing remains the gateway to large companies[\/vc_custom_heading][vc_empty_space empty_h=&#8221;0&#8243;][vc_separator sep_color=&#8221;color-554342&#8243; el_width=&#8221;10%&#8221; el_height=&#8221;1px&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/1&#8243;][vc_custom_heading text_color=&#8221;color-154192&#8243; heading_semantic=&#8221;h1&#8243; text_font=&#8221;font-604939&#8243; text_size=&#8221;fontsize-101650&#8243; text_weight=&#8221;400&#8243; uncode_shortcode_id=&#8221;103654&#8243; text_color_type=&#8221;uncode-palette&#8221;]The problem[\/vc_custom_heading][\/vc_column_inner][\/vc_row_inner][vc_empty_space empty_h=&#8221;0&#8243;][vc_row_inner][vc_column_inner column_width_percent=&#8221;100&#8243; position_vertical=&#8221;middle&#8221; gutter_size=&#8221;3&#8243; override_padding=&#8221;yes&#8221; column_padding=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_column_text text_lead=&#8221;yes&#8221; uncode_shortcode_id=&#8221;661767&#8243;]The risk of <strong>phishing attacks<\/strong> is particularly high in large companies with thousands of employees. Cyber criminals use deceptively genuine emails that are often overlooked in the hustle and bustle of everyday working life. Just one click on a manipulated link can be enough to reveal sensitive data or compromise entire systems. Standardized <strong>awareness measures<\/strong> often fall short here: they are too general, do not reach the relevant <a href=\"https:\/\/skillbest.com\/en\/custom-learning-the-target-group-in-focus\/\">target groups<\/a> and only create limited sustainable awareness. Our approach to <strong>phishing e-learning<\/strong> starts at precisely this point: with realistic, company-specific examples and practical exercises that pick up employees where the threat actually arises &#8211; in their daily e-mail traffic.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column column_width_percent=&#8221;100&#8243; position_vertical=&#8221;middle&#8221; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/2&#8243; uncode_shortcode_id=&#8221;961542&#8243;][vc_single_image media=&#8221;88814&#8243; media_width_percent=&#8221;100&#8243; alignment=&#8221;right&#8221; uncode_shortcode_id=&#8221;201374&#8243; el_class=&#8221;skillbest-round-corner-img&#8221;][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;2&#8243; top_padding=&#8221;3&#8243; bottom_padding=&#8221;2&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;4&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; uncode_shortcode_id=&#8221;206167&#8243;][vc_column column_width_percent=&#8221;100&#8243; position_horizontal=&#8221;left&#8221; position_vertical=&#8221;middle&#8221; gutter_size=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/2&#8243; uncode_shortcode_id=&#8221;998986&#8243;][vc_single_image media=&#8221;88816&#8243; media_width_percent=&#8221;100&#8243; uncode_shortcode_id=&#8221;125473&#8243; el_class=&#8221;skillbest-round-corner-img&#8221;][\/vc_column][vc_column column_width_percent=&#8221;100&#8243; position_vertical=&#8221;middle&#8221; gutter_size=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/2&#8243; uncode_shortcode_id=&#8221;225764&#8243;][vc_row_inner row_inner_height_percent=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;3&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column_inner column_width_percent=&#8221;100&#8243; gutter_size=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_custom_heading text_color=&#8221;color-554342&#8243; heading_semantic=&#8221;h6&#8243; text_size=&#8221;fontsize-197929&#8243; text_transform=&#8221;uppercase&#8221; uncode_shortcode_id=&#8221;158103&#8243; text_color_type=&#8221;uncode-palette&#8221;]Individual phishing e-learning with practical relevance[\/vc_custom_heading][vc_empty_space empty_h=&#8221;0&#8243;][vc_separator sep_color=&#8221;color-554342&#8243; el_width=&#8221;10%&#8221; el_height=&#8221;1px&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/1&#8243;][vc_custom_heading text_color=&#8221;color-154192&#8243; heading_semantic=&#8221;h1&#8243; text_font=&#8221;font-604939&#8243; text_size=&#8221;fontsize-101650&#8243; text_weight=&#8221;400&#8243; uncode_shortcode_id=&#8221;155510&#8243; text_color_type=&#8221;uncode-palette&#8221;]The solution[\/vc_custom_heading][\/vc_column_inner][\/vc_row_inner][vc_empty_space empty_h=&#8221;0&#8243;][vc_row_inner][vc_column_inner column_width_percent=&#8221;100&#8243; position_vertical=&#8221;middle&#8221; gutter_size=&#8221;3&#8243; override_padding=&#8221;yes&#8221; column_padding=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_column_text text_lead=&#8221;yes&#8221; uncode_shortcode_id=&#8221;180869&#8243;]Effective <strong>phishing e-learning<\/strong> for large companies is characterized by the fact that it does not follow a standard procedure, but reflects the real risks in the company. Instead of abstract examples, employees experience concrete situations that they could actually encounter in their day-to-day work. This noticeably increases awareness because the training has direct relevance. In addition, the <a href=\"https:\/\/skillbest.com\/en\/e-learning-formats\/\">learning format<\/a> is designed to be flexible and scalable &#8211; whether for 500 or 50,000 employees. The approach is particularly effective if the training is not &#8220;worked through&#8221; once a year, but is used dynamically: for example, automatically when someone has fallen for a phishing email. This needs-based learning ensures that <a href=\"https:\/\/skillbest.com\/en\/cybertsecurity-online-training-with-storytelling-for-real-awareness\/\">cyber security<\/a> is not perceived as a compulsory exercise, but as concrete support in critical situations.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;0&#8243; top_padding=&#8221;3&#8243; bottom_padding=&#8221;2&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;3&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; content_parallax=&#8221;0&#8243; uncode_shortcode_id=&#8221;168791&#8243;][vc_column column_width_percent=&#8221;100&#8243; position_vertical=&#8221;middle&#8221; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243; uncode_shortcode_id=&#8221;118537&#8243;][vc_single_image media=&#8221;88818&#8243; media_width_percent=&#8221;60&#8243; alignment=&#8221;center&#8221; uncode_shortcode_id=&#8221;724759&#8243;][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;0&#8243; top_padding=&#8221;0&#8243; bottom_padding=&#8221;0&#8243; back_color=&#8221;color-672943&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;3&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; content_parallax=&#8221;0&#8243; uncode_shortcode_id=&#8221;177621&#8243; back_color_type=&#8221;uncode-palette&#8221;][vc_column column_width_percent=&#8221;100&#8243; position_vertical=&#8221;bottom&#8221; gutter_size=&#8221;0&#8243; override_padding=&#8221;yes&#8221; column_padding=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243; uncode_shortcode_id=&#8221;662599&#8243;][vc_row_inner row_inner_height_percent=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;3&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; uncode_shortcode_id=&#8221;622313&#8243;][vc_column_inner column_width_percent=&#8221;80&#8243; position_horizontal=&#8221;left&#8221; position_vertical=&#8221;middle&#8221; gutter_size=&#8221;2&#8243; override_padding=&#8221;yes&#8221; column_padding=&#8221;3&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243; uncode_shortcode_id=&#8221;212158&#8243;][vc_custom_heading text_color=&#8221;color-154192&#8243; heading_semantic=&#8221;h1&#8243; text_font=&#8221;font-604939&#8243; text_size=&#8221;fontsize-898198&#8243; text_weight=&#8221;400&#8243; uncode_shortcode_id=&#8221;995863&#8243; text_color_type=&#8221;uncode-palette&#8221;]Dangerous links often go unnoticed[\/vc_custom_heading][vc_column_text text_lead=&#8221;yes&#8221; uncode_shortcode_id=&#8221;150951&#8243;]A central problem with <strong>phishing emails<\/strong> is that hyperlinks are not checked by most users. Many do not even realize that the true address of a link can be displayed simply by hovering over it with the mouse. It is precisely this brief glance that could make the difference between a safe click or entering a professionally faked phishing site.  <\/p>\n<p>But even if the URL is displayed, there is often a lack of knowledge about what to look out for when reading it: small deviations in the domain name, unusual endings or deliberately used special characters. Our approach to <strong data-start=\"915\" data-end=\"938\">phishing e-learning<\/strong> therefore focuses precisely on this point: the training teaches how links can be safely checked and which patterns immediately look suspicious. In this way, employees learn not only to recognize suspicious hyperlinks, but also to clearly identify them &#8211; before any damage is done.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;2&#8243; top_padding=&#8221;3&#8243; bottom_padding=&#8221;2&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;4&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; uncode_shortcode_id=&#8221;206167&#8243;][vc_column column_width_percent=&#8221;100&#8243; position_horizontal=&#8221;left&#8221; position_vertical=&#8221;middle&#8221; gutter_size=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/2&#8243; uncode_shortcode_id=&#8221;854964&#8243;][vc_single_image media=&#8221;88820&#8243; media_width_percent=&#8221;100&#8243; uncode_shortcode_id=&#8221;121206&#8243; el_class=&#8221;skillbest-round-corner-img&#8221;][\/vc_column][vc_column column_width_percent=&#8221;100&#8243; position_vertical=&#8221;middle&#8221; gutter_size=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/2&#8243; uncode_shortcode_id=&#8221;225764&#8243;][vc_row_inner row_inner_height_percent=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;3&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column_inner column_width_percent=&#8221;100&#8243; gutter_size=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_custom_heading text_color=&#8221;color-554342&#8243; heading_semantic=&#8221;h6&#8243; text_size=&#8221;fontsize-197929&#8243; text_transform=&#8221;uppercase&#8221; uncode_shortcode_id=&#8221;793893&#8243; text_color_type=&#8221;uncode-palette&#8221;]Recognizing phishing in everyday working life[\/vc_custom_heading][vc_empty_space empty_h=&#8221;0&#8243;][vc_separator sep_color=&#8221;color-554342&#8243; el_width=&#8221;10%&#8221; el_height=&#8221;1px&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/1&#8243;][vc_custom_heading text_color=&#8221;color-154192&#8243; heading_semantic=&#8221;h1&#8243; text_font=&#8221;font-604939&#8243; text_size=&#8221;fontsize-101650&#8243; text_weight=&#8221;400&#8243; uncode_shortcode_id=&#8221;188433&#8243; text_color_type=&#8221;uncode-palette&#8221;]Realistic e-mail scenarios[\/vc_custom_heading][\/vc_column_inner][\/vc_row_inner][vc_empty_space empty_h=&#8221;0&#8243;][vc_row_inner][vc_column_inner column_width_percent=&#8221;100&#8243; position_vertical=&#8221;middle&#8221; gutter_size=&#8221;3&#8243; override_padding=&#8221;yes&#8221; column_padding=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_column_text text_lead=&#8221;yes&#8221; uncode_shortcode_id=&#8221;822455&#8243;]In the <strong>phishing e-learning <\/strong>course, participants work through a list of several emails &#8211; just like in real life when they open their inbox in the morning. Not all of the messages are dangerous, but many seem perfectly legitimate at first glance. Some come from internal departments, colleagues or known contacts, with familiar signatures, abbreviations or formatting. However, these inconspicuous emails conceal deliberately crafted phishing emails. The learners&#8217; task is to identify them, explain exactly how the deception is recognizable and thus sharpen their own judgment.    <\/p>\n<p>To ensure that the training has maximum relevance, we develop the email scenarios <strong>individually to suit the company<\/strong>: with realistic senders, internal terms, department abbreviations or typical communication patterns. This creates a practical learning environment that not only sensitizes employees to theoretical risks, but also prepares them directly for the daily dangers in their own inboxes.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;2&#8243; top_padding=&#8221;3&#8243; bottom_padding=&#8221;2&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;4&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; uncode_shortcode_id=&#8221;206167&#8243;][vc_column column_width_percent=&#8221;100&#8243; position_vertical=&#8221;middle&#8221; gutter_size=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/2&#8243; uncode_shortcode_id=&#8221;350922&#8243;][vc_row_inner row_inner_height_percent=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;3&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column_inner column_width_percent=&#8221;100&#8243; gutter_size=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_custom_heading text_color=&#8221;color-554342&#8243; heading_semantic=&#8221;h6&#8243; text_size=&#8221;fontsize-197929&#8243; text_transform=&#8221;uppercase&#8221; uncode_shortcode_id=&#8221;104919&#8243; text_color_type=&#8221;uncode-palette&#8221;]Recognizing phishing step by step[\/vc_custom_heading][vc_empty_space empty_h=&#8221;0&#8243;][vc_separator sep_color=&#8221;color-554342&#8243; el_width=&#8221;10%&#8221; el_height=&#8221;1px&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/1&#8243;][vc_custom_heading text_color=&#8221;color-154192&#8243; heading_semantic=&#8221;h1&#8243; text_font=&#8221;font-604939&#8243; text_size=&#8221;fontsize-101650&#8243; text_weight=&#8221;400&#8243; uncode_shortcode_id=&#8221;172595&#8243; text_color_type=&#8221;uncode-palette&#8221;]Realistic emails, clear decisions[\/vc_custom_heading][\/vc_column_inner][\/vc_row_inner][vc_empty_space empty_h=&#8221;0&#8243;][vc_row_inner][vc_column_inner column_width_percent=&#8221;100&#8243; position_vertical=&#8221;middle&#8221; gutter_size=&#8221;3&#8243; override_padding=&#8221;yes&#8221; column_padding=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_column_text text_lead=&#8221;yes&#8221; uncode_shortcode_id=&#8221;200637&#8243;]In the <strong>phishing e-learning<\/strong> course, participants see a deceptively real email that is modeled on the corporate environment &#8211; with matching senders, signatures and familiar wording. The task is to critically examine this message and decide whether it is phishing or not. In the process, a crucial aspect is trained that is often overlooked in practice: how to deal with hyperlinks. Before learners can even evaluate the email, they have to move their mouse over the link in order to display the actual URL. This is precisely how the &#8220;gap&#8221; is closed: many employees did not previously know how to check links reliably.    <\/p>\n<p>The exercise is structured in two stages: First, a decision is made as to whether it is phishing. This is followed by the second task, in which the learners have to explain specifically why the email is clearly a phishing message &#8211; for example due to suspicious URL structures, unusual domain endings or conspicuous sender details. This approach not only attracts attention, but also anchors the knowledge in the long term because it has to be applied immediately.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column column_width_percent=&#8221;100&#8243; position_vertical=&#8221;middle&#8221; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/2&#8243; uncode_shortcode_id=&#8221;167720&#8243;][vc_single_image media=&#8221;88824&#8243; media_width_percent=&#8221;100&#8243; alignment=&#8221;right&#8221; uncode_shortcode_id=&#8221;326388&#8243; el_class=&#8221;skillbest-round-corner-img&#8221;][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;2&#8243; top_padding=&#8221;3&#8243; bottom_padding=&#8221;2&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;4&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; uncode_shortcode_id=&#8221;206167&#8243;][vc_column column_width_percent=&#8221;100&#8243; position_horizontal=&#8221;left&#8221; position_vertical=&#8221;middle&#8221; gutter_size=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/2&#8243; uncode_shortcode_id=&#8221;854964&#8243;][vc_single_image media=&#8221;88826&#8243; media_width_percent=&#8221;100&#8243; uncode_shortcode_id=&#8221;613436&#8243; el_class=&#8221;skillbest-round-corner-img&#8221;][\/vc_column][vc_column column_width_percent=&#8221;100&#8243; position_vertical=&#8221;middle&#8221; gutter_size=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/2&#8243; uncode_shortcode_id=&#8221;225764&#8243;][vc_row_inner row_inner_height_percent=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;3&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column_inner column_width_percent=&#8221;100&#8243; gutter_size=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_custom_heading text_color=&#8221;color-554342&#8243; heading_semantic=&#8221;h6&#8243; text_size=&#8221;fontsize-197929&#8243; text_transform=&#8221;uppercase&#8221; uncode_shortcode_id=&#8221;201617&#8243; text_color_type=&#8221;uncode-palette&#8221;]Traceable measurement of phishing detection[\/vc_custom_heading][vc_empty_space empty_h=&#8221;0&#8243;][vc_separator sep_color=&#8221;color-554342&#8243; el_width=&#8221;10%&#8221; el_height=&#8221;1px&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/1&#8243;][vc_custom_heading text_color=&#8221;color-154192&#8243; heading_semantic=&#8221;h1&#8243; text_font=&#8221;font-604939&#8243; text_size=&#8221;fontsize-101650&#8243; text_weight=&#8221;400&#8243; uncode_shortcode_id=&#8221;400502&#8243; text_color_type=&#8221;uncode-palette&#8221;]Clear evaluation of the results[\/vc_custom_heading][\/vc_column_inner][\/vc_row_inner][vc_empty_space empty_h=&#8221;0&#8243;][vc_row_inner][vc_column_inner column_width_percent=&#8221;100&#8243; position_vertical=&#8221;middle&#8221; gutter_size=&#8221;3&#8243; override_padding=&#8221;yes&#8221; column_padding=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_column_text text_lead=&#8221;yes&#8221; uncode_shortcode_id=&#8221;868015&#8243;]At the end of the <strong>phishing e-learning course<\/strong>, each learner receives a detailed evaluation of their own decisions. All emails that were checked during the training are listed again &#8211; including the question of whether they were correctly classified as phishing or harmless. It is particularly important to check not only whether the right decision was made, but also whether the decisive clues were recognized and named. Only if the typical characteristics such as manipulated links, suspicious domains or conspicuous sender details have actually been identified is the task considered to have been completed.   <\/p>\n<p>This personal feedback is particularly helpful for the learners: they recognize exactly where they are already acting confidently and where there are still uncertainties. This gives them a clear picture of which details can be easily overlooked in everyday life &#8211; and where a phishing email might still deceive them. This transparency not only raises awareness, but also gives every employee concrete starting points to improve their awareness step by step and confidently fend off phishing attacks in future.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;0&#8243; top_padding=&#8221;3&#8243; bottom_padding=&#8221;3&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;3&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; content_parallax=&#8221;0&#8243; el_id=&#8221;skillbest-gradient-blue&#8221; uncode_shortcode_id=&#8221;202523&#8243;][vc_column width=&#8221;1\/1&#8243;][vc_row_inner row_inner_height_percent=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;4&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; el_class=&#8221;skillbest-white-text-box&#8221;][vc_column_inner column_width_percent=&#8221;100&#8243; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_custom_heading text_color=&#8221;color-xsdn&#8221; text_size=&#8221;fontsize-101650&#8243; text_weight=&#8221;400&#8243; uncode_shortcode_id=&#8221;703974&#8243; text_color_type=&#8221;uncode-palette&#8221;]Recognize phishing before it is clicked.[\/vc_custom_heading][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;2&#8243; top_padding=&#8221;3&#8243; bottom_padding=&#8221;3&#8243; back_color=&#8221;color-672943&#8243; overlay_alpha=&#8221;0&#8243; gutter_size=&#8221;3&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; uncode_shortcode_id=&#8221;506464&#8243; back_color_type=&#8221;uncode-palette&#8221;][vc_column column_width_percent=&#8221;100&#8243; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;4&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/4&#8243; uncode_shortcode_id=&#8221;414629&#8243;][vc_single_image media=&#8221;88828&#8243; media_width_percent=&#8221;60&#8243; alignment=&#8221;center&#8221; uncode_shortcode_id=&#8221;185887&#8243;][\/vc_column][vc_column column_width_percent=&#8221;100&#8243; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;3\/4&#8243; uncode_shortcode_id=&#8221;120672&#8243;][vc_custom_heading text_color=&#8221;color-154192&#8243; heading_semantic=&#8221;h1&#8243; text_font=&#8221;font-604939&#8243; text_size=&#8221;fontsize-155944&#8243; text_weight=&#8221;400&#8243; uncode_shortcode_id=&#8221;532477&#8243; text_color_type=&#8221;uncode-palette&#8221;]Interview with G\u00fcnther Veit[\/vc_custom_heading][vc_custom_heading text_color=&#8221;color-185359&#8243; heading_semantic=&#8221;h6&#8243; text_font=&#8221;font-604939&#8243; text_size=&#8221;fontsize-828006&#8243; text_weight=&#8221;500&#8243; uncode_shortcode_id=&#8221;458545&#8243; text_color_type=&#8221;uncode-palette&#8221;]Why did you publish a best practice on phishing e-learning? What was the trigger?[\/vc_custom_heading][vc_column_text text_lead=&#8221;yes&#8221; uncode_shortcode_id=&#8221;387978&#8243;]We see at many large companies that phishing is still one of the biggest cyber risks &#8211; and yet awareness measures are often too superficial. Traditional e-learning courses or information videos may raise awareness, but they remain too general and therefore ineffective. Especially when it comes to phishing, this is not enough: employees must learn to recognize suspicious emails in their own context. That&#8217;s why we wanted to show what a practical concept looks like that can be applied directly in day-to-day business. We need to activate employees, especially in times of AI, when it is becoming even more difficult to check or recognize emails or voice phishing.[\/vc_column_text][vc_custom_heading text_color=&#8221;color-185359&#8243; heading_semantic=&#8221;h6&#8243; text_font=&#8221;font-604939&#8243; text_size=&#8221;fontsize-828006&#8243; text_weight=&#8221;500&#8243; uncode_shortcode_id=&#8221;765501&#8243; text_color_type=&#8221;uncode-palette&#8221;]What does the approach look like in concrete terms?[\/vc_custom_heading][vc_column_text text_lead=&#8221;yes&#8221; uncode_shortcode_id=&#8221;181195&#8243;]The e-learning starts in a deliberately realistic way: learners receive a list of different emails &#8211; some are safe, others are clearly phishing. Just like in a real inbox, it is not immediately clear what is safe and what is not. Each email is examined individually and links have to be actively checked by hovering over them with the mouse. In this way, we train a crucial point that many employees were previously unaware of: that the true URL is hidden behind it. It is then important not only to say whether it is phishing, but also to explain how this can be recognized.[\/vc_column_text][vc_custom_heading text_color=&#8221;color-185359&#8243; heading_semantic=&#8221;h6&#8243; text_font=&#8221;font-604939&#8243; text_size=&#8221;fontsize-828006&#8243; text_weight=&#8221;500&#8243; uncode_shortcode_id=&#8221;107824&#8243; text_color_type=&#8221;uncode-palette&#8221;]So the focus is on active action?[\/vc_custom_heading][vc_column_text text_lead=&#8221;yes&#8221; uncode_shortcode_id=&#8221;177377&#8243;]Exactly. Our aim was to turn passive information into an active decision-making situation. Only when employees check, decide and give reasons themselves will what they have learned really stick. That&#8217;s why we rely on authentic emails with real signatures, internal abbreviations or department names. This creates a scenario that feels absolutely realistic &#8211; and therefore significantly increases attention.[\/vc_column_text][vc_custom_heading text_color=&#8221;color-185359&#8243; heading_semantic=&#8221;h6&#8243; text_font=&#8221;font-604939&#8243; text_size=&#8221;fontsize-828006&#8243; text_weight=&#8221;500&#8243; uncode_shortcode_id=&#8221;107080&#8243; text_color_type=&#8221;uncode-palette&#8221;]Is there another element that was particularly important to you?[\/vc_custom_heading][vc_column_text text_lead=&#8221;yes&#8221; uncode_shortcode_id=&#8221;107946&#8243;]Yes, the needs-based use. Phishing e-learning is most effective when it is used automatically when an incident has actually occurred &#8211; for example, when someone has clicked on a fake email. The appropriate training can then be assigned immediately via the learning management system. This makes the approach sustainable because learning takes place where there is a need &#8211; and not according to the scattergun principle.[\/vc_column_text][vc_custom_heading text_color=&#8221;color-185359&#8243; heading_semantic=&#8221;h6&#8243; text_font=&#8221;font-604939&#8243; text_size=&#8221;fontsize-828006&#8243; text_weight=&#8221;500&#8243; uncode_shortcode_id=&#8221;159900&#8243; text_color_type=&#8221;uncode-palette&#8221;]In conclusion: What is special about this best practice for you?[\/vc_custom_heading][vc_column_text text_lead=&#8221;yes&#8221; uncode_shortcode_id=&#8221;828101&#8243;]It shows how to turn an abstract risk into tangible, interactive training. Employees experience phishing as they encounter it in their everyday lives &#8211; and learn to recognize dangers on their own. For me, the special thing is that we don&#8217;t focus on fear, but on confidence. Once you have been trained to check links and recognize suspicious patterns, you will automatically apply this in real working life. This is exactly what makes this best practice so valuable.[\/vc_column_text][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;2&#8243; top_padding=&#8221;3&#8243; bottom_padding=&#8221;3&#8243; back_color=&#8221;color-672943&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;0&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column width=&#8221;1\/1&#8243;][vc_row_inner row_inner_height_percent=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;0&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column_inner column_width_percent=&#8221;100&#8243; gutter_size=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;4\/6&#8243;][vc_custom_heading text_color=&#8221;color-554342&#8243; heading_semantic=&#8221;h6&#8243; text_size=&#8221;fontsize-197929&#8243; text_transform=&#8221;uppercase&#8221;]Insights[\/vc_custom_heading][vc_empty_space empty_h=&#8221;0&#8243;][vc_separator sep_color=&#8221;color-554342&#8243; el_width=&#8221;10%&#8221; el_height=&#8221;1px&#8221;][\/vc_column_inner][vc_column_inner column_width_percent=&#8221;100&#8243; position_horizontal=&#8221;right&#8221; position_vertical=&#8221;middle&#8221; align_horizontal=&#8221;align_right&#8221; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/6&#8243;][vc_single_image media=&#8221;82227&#8243; media_width_use_pixel=&#8221;yes&#8221; alignment=&#8221;right&#8221; media_width_pixel=&#8221;50&#8243;][\/vc_column_inner][vc_column_inner column_width_percent=&#8221;100&#8243; position_horizontal=&#8221;right&#8221; position_vertical=&#8221;middle&#8221; align_horizontal=&#8221;align_right&#8221; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/6&#8243;][vc_custom_heading text_color=&#8221;color-154192&#8243; heading_semantic=&#8221;h6&#8243; text_font=&#8221;font-604939&#8243; text_size=&#8221;fontsize-330338&#8243; text_weight=&#8221;700&#8243; text_transform=&#8221;uppercase&#8221; el_class=&#8221;skillbest-link-readmore&#8221;]<a href=\"https:\/\/skillbest.com\/en\/insights\/\">Show all<\/a>[\/vc_custom_heading][\/vc_column_inner][\/vc_row_inner][vc_row_inner row_inner_height_percent=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; equal_height=&#8221;yes&#8221; gutter_size=&#8221;3&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column_inner column_width_percent=&#8221;100&#8243; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243;][uncode_index el_id=&#8221;index-537495863&#8243; index_type=&#8221;carousel&#8221; loop=&#8221;size:9|order_by:date|post_type:post|taxonomy_count:10&#8243; carousel_lg=&#8221;3&#8243; carousel_md=&#8221;2&#8243; carousel_sm=&#8221;1&#8243; gutter_size=&#8221;3&#8243; post_items=&#8221;media|featured|onpost|original,title,text|excerpt|90,link|link|default_size|Mehr erfahren&#8221; carousel_interval=&#8221;3000&#8243; carousel_navspeed=&#8221;400&#8243; carousel_loop=&#8221;yes&#8221; stage_padding=&#8221;0&#8243; single_overlay_color=&#8221;color-554342&#8243; single_overlay_opacity=&#8221;50&#8243; single_text_visible=&#8221;yes&#8221; single_text_anim=&#8221;no&#8221; single_padding=&#8221;2&#8243; single_title_dimension=&#8221;h5&#8243; single_border=&#8221;yes&#8221; el_class=&#8221;.skillbest-blog-link-readmore&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;2&#8243; top_padding=&#8221;0&#8243; bottom_padding=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;3&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; uncode_shortcode_id=&#8221;927037&#8243;][vc_column column_width_percent=&#8221;100&#8243; gutter_size=&#8221;3&#8243; override_padding=&#8221;yes&#8221; column_padding=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243; uncode_shortcode_id=&#8221;185614&#8243;][vc_raw_html]PGRpdiBpZD0ic3RpY2t5LWNvbnRhY3QiPgo8YSBocmVmPSJodHRwczovL3NraWxsYmVzdC5jb20vZW4vY29udGFjdC8iPkNvbnRhY3Q8L2E+CjxkaXYgaWQ9InN0aWNreS1jb250YWN0LXBvaW50Ij4KPGEgaHJlZj0iaHR0cHM6Ly9za2lsbGJlc3QuY29tL2VuL2NvbnRhY3QvIj4gPC9hPgo8L2Rpdj4KPC9kaXY+Cgo=[\/vc_raw_html][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Train employees to reliably recognize phishing emails in their day-to-day work. Realistic emails, authentic senders and personal feedback increase awareness and promote lasting confidence when dealing with suspicious links. <\/p>\n","protected":false},"featured_media":88832,"template":"","best-practice-category":[840,882],"class_list":["post-88833","best-practice","type-best-practice","status-publish","has-post-thumbnail","hentry","best-practice-category-it-security","best-practice-category-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Best Practice: Phishing e-Learning<\/title>\n<meta name=\"description\" content=\"Phishing e-learning: Employees recognize realistic fake emails, check links securely and increase their awareness in their everyday work.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/skillbest.com\/en\/best-practice\/phishing-elearning\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing e-Learning\" \/>\n<meta property=\"og:description\" content=\"Phishing e-learning: Employees recognize realistic fake emails, check links securely and increase their awareness in their everyday work.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/skillbest.com\/en\/best-practice\/phishing-elearning\/\" \/>\n<meta property=\"og:site_name\" content=\"skillbest GmbH\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/skillbest.elearning\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-23T14:45:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/skillbest.com\/wp-content\/uploads\/2025\/08\/Phishing-e-Learning-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Skillbest_GmbH\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"23 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/skillbest.com\\\/en\\\/best-practice\\\/phishing-elearning\\\/\",\"url\":\"https:\\\/\\\/skillbest.com\\\/en\\\/best-practice\\\/phishing-elearning\\\/\",\"name\":\"Best Practice: Phishing e-Learning\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/skillbest.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/skillbest.com\\\/en\\\/best-practice\\\/phishing-elearning\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/skillbest.com\\\/en\\\/best-practice\\\/phishing-elearning\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/skillbest.com\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Phishing-e-Learning-1.jpg\",\"datePublished\":\"2025-08-23T13:47:14+00:00\",\"dateModified\":\"2025-08-23T14:45:06+00:00\",\"description\":\"Phishing e-learning: Employees recognize realistic fake emails, check links securely and increase their awareness in their everyday work.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/skillbest.com\\\/en\\\/best-practice\\\/phishing-elearning\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/skillbest.com\\\/en\\\/best-practice\\\/phishing-elearning\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/skillbest.com\\\/en\\\/best-practice\\\/phishing-elearning\\\/#primaryimage\",\"url\":\"https:\\\/\\\/skillbest.com\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Phishing-e-Learning-1.jpg\",\"contentUrl\":\"https:\\\/\\\/skillbest.com\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Phishing-e-Learning-1.jpg\",\"width\":1200,\"height\":627,\"caption\":\"Phishing e-Learning\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/skillbest.com\\\/en\\\/best-practice\\\/phishing-elearning\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/skillbest.com\\\/en\\\/e-learning-agency\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Best Practices\",\"item\":\"https:\\\/\\\/skillbest.com\\\/en\\\/best-practices\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Phishing e-Learning\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/skillbest.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/skillbest.com\\\/en\\\/\",\"name\":\"skillbest GmbH\",\"description\":\"e-Learning Agentur\",\"publisher\":{\"@id\":\"https:\\\/\\\/skillbest.com\\\/en\\\/#organization\"},\"alternateName\":\"skillbest\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/skillbest.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/skillbest.com\\\/en\\\/#organization\",\"name\":\"skillbest GmbH\",\"alternateName\":\"skillbest\",\"url\":\"https:\\\/\\\/skillbest.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/skillbest.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/skillbest.com\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/logo_skillbest_transparent.png\",\"contentUrl\":\"https:\\\/\\\/skillbest.com\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/logo_skillbest_transparent.png\",\"width\":330,\"height\":98,\"caption\":\"skillbest GmbH\"},\"image\":{\"@id\":\"https:\\\/\\\/skillbest.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/skillbest.elearning\\\/\",\"https:\\\/\\\/x.com\\\/Skillbest_GmbH\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/skillbest\"],\"description\":\"Als e-Learning Agentur bietet skillbest Unternehmen neuartige und inspirierend kreative L\u00f6sungen rund um die Digitalisierung von Wissen.\",\"email\":\"office@skillbest.com\",\"telephone\":\"+43 316 \\\/34 19 95\",\"legalName\":\"skillbest GmbH\",\"foundingDate\":\"2017-01-01\",\"vatID\":\"ATU72492858\",\"taxID\":\"FN 475032b\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"11\",\"maxValue\":\"50\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Best Practice: Phishing e-Learning","description":"Phishing e-learning: Employees recognize realistic fake emails, check links securely and increase their awareness in their everyday work.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/skillbest.com\/en\/best-practice\/phishing-elearning\/","og_locale":"en_US","og_type":"article","og_title":"Phishing e-Learning","og_description":"Phishing e-learning: Employees recognize realistic fake emails, check links securely and increase their awareness in their everyday work.","og_url":"https:\/\/skillbest.com\/en\/best-practice\/phishing-elearning\/","og_site_name":"skillbest GmbH","article_publisher":"https:\/\/www.facebook.com\/skillbest.elearning\/","article_modified_time":"2025-08-23T14:45:06+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/skillbest.com\/wp-content\/uploads\/2025\/08\/Phishing-e-Learning-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@Skillbest_GmbH","twitter_misc":{"Est. reading time":"23 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/skillbest.com\/en\/best-practice\/phishing-elearning\/","url":"https:\/\/skillbest.com\/en\/best-practice\/phishing-elearning\/","name":"Best Practice: Phishing e-Learning","isPartOf":{"@id":"https:\/\/skillbest.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/skillbest.com\/en\/best-practice\/phishing-elearning\/#primaryimage"},"image":{"@id":"https:\/\/skillbest.com\/en\/best-practice\/phishing-elearning\/#primaryimage"},"thumbnailUrl":"https:\/\/skillbest.com\/wp-content\/uploads\/2025\/08\/Phishing-e-Learning-1.jpg","datePublished":"2025-08-23T13:47:14+00:00","dateModified":"2025-08-23T14:45:06+00:00","description":"Phishing e-learning: Employees recognize realistic fake emails, check links securely and increase their awareness in their everyday work.","breadcrumb":{"@id":"https:\/\/skillbest.com\/en\/best-practice\/phishing-elearning\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/skillbest.com\/en\/best-practice\/phishing-elearning\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/skillbest.com\/en\/best-practice\/phishing-elearning\/#primaryimage","url":"https:\/\/skillbest.com\/wp-content\/uploads\/2025\/08\/Phishing-e-Learning-1.jpg","contentUrl":"https:\/\/skillbest.com\/wp-content\/uploads\/2025\/08\/Phishing-e-Learning-1.jpg","width":1200,"height":627,"caption":"Phishing e-Learning"},{"@type":"BreadcrumbList","@id":"https:\/\/skillbest.com\/en\/best-practice\/phishing-elearning\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/skillbest.com\/en\/e-learning-agency\/"},{"@type":"ListItem","position":2,"name":"Best Practices","item":"https:\/\/skillbest.com\/en\/best-practices\/"},{"@type":"ListItem","position":3,"name":"Phishing e-Learning"}]},{"@type":"WebSite","@id":"https:\/\/skillbest.com\/en\/#website","url":"https:\/\/skillbest.com\/en\/","name":"skillbest GmbH","description":"e-Learning Agentur","publisher":{"@id":"https:\/\/skillbest.com\/en\/#organization"},"alternateName":"skillbest","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/skillbest.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/skillbest.com\/en\/#organization","name":"skillbest GmbH","alternateName":"skillbest","url":"https:\/\/skillbest.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/skillbest.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/skillbest.com\/wp-content\/uploads\/2019\/10\/logo_skillbest_transparent.png","contentUrl":"https:\/\/skillbest.com\/wp-content\/uploads\/2019\/10\/logo_skillbest_transparent.png","width":330,"height":98,"caption":"skillbest GmbH"},"image":{"@id":"https:\/\/skillbest.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/skillbest.elearning\/","https:\/\/x.com\/Skillbest_GmbH","https:\/\/www.linkedin.com\/company\/skillbest"],"description":"Als e-Learning Agentur bietet skillbest Unternehmen neuartige und inspirierend kreative L\u00f6sungen rund um die Digitalisierung von Wissen.","email":"office@skillbest.com","telephone":"+43 316 \/34 19 95","legalName":"skillbest GmbH","foundingDate":"2017-01-01","vatID":"ATU72492858","taxID":"FN 475032b","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"11","maxValue":"50"}}]}},"_links":{"self":[{"href":"https:\/\/skillbest.com\/en\/wp-json\/wp\/v2\/best-practice\/88833","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/skillbest.com\/en\/wp-json\/wp\/v2\/best-practice"}],"about":[{"href":"https:\/\/skillbest.com\/en\/wp-json\/wp\/v2\/types\/best-practice"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/skillbest.com\/en\/wp-json\/wp\/v2\/media\/88832"}],"wp:attachment":[{"href":"https:\/\/skillbest.com\/en\/wp-json\/wp\/v2\/media?parent=88833"}],"wp:term":[{"taxonomy":"best-practice-category","embeddable":true,"href":"https:\/\/skillbest.com\/en\/wp-json\/wp\/v2\/best-practice-category?post=88833"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}